Network data classifier based on the recurrent neural network.
☆20Apr 3, 2019Updated 6 years ago
Alternatives and similar repositories for LSTM-IDS
Users that are interested in LSTM-IDS are comparing it to the libraries listed below
Sorting:
- Adversarial Machine Learning applications on network-based Intrusion Detection System (IDS).☆28May 8, 2020Updated 5 years ago
- Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for …☆93Oct 18, 2019Updated 6 years ago
- A deep learning based intrusion detection system using CSE-CIC-IDS2018 dataset.☆13Apr 16, 2020Updated 5 years ago
- implement IDS using deep learning☆12May 24, 2019Updated 6 years ago
- An IDS implementation using machine learning☆39Aug 5, 2017Updated 8 years ago
- A Recurrent Neural Networks implementation using Keras for network intrusion detection☆31Jun 14, 2021Updated 4 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port an…☆42Jul 20, 2018Updated 7 years ago
- Machine-learning-based intrusion detection☆38Jul 13, 2018Updated 7 years ago
- NSLKDD Dataset for WEKA☆36Mar 2, 2018Updated 8 years ago
- Tensorflow Implementation of paper Applying long short-term memory recurrent neural networks to intrusion detection with KDDCup99 Data☆15Nov 14, 2018Updated 7 years ago
- This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Sec…☆295Dec 22, 2023Updated 2 years ago
- Intrusion detection system with Apache Spark and deep learning☆18Mar 14, 2019Updated 6 years ago
- Network Security Analysis using Machine Learning on the NSL-KDD dataset from the KDD Cup 1999☆21Nov 3, 2019Updated 6 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Implemented a network intrusion detection system for a software defined network using Random Forest method for classification of port and…☆24Nov 30, 2018Updated 7 years ago
- Based on the CICIDS2017 dataset and Pytorch platform☆29May 8, 2019Updated 6 years ago
- Machine Learning Based - Intrusion Detection System☆32Jun 21, 2022Updated 3 years ago
- Deep learning based Intrusion Detection System☆34Apr 26, 2020Updated 5 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- An Intelligent Intrusion Detection System for IoT networks using Gated Recurrent Neural Networks (GRU) : A Deep Learning Approach☆33Jul 16, 2018Updated 7 years ago
- The application of using ML in intrusion detection has mostly been limited to research work and showing results on the formally used kdd9…☆11Oct 13, 2020Updated 5 years ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- A network data classifier for UNSW-NB15 data set. This is an university course work for "ITKST42 Information Security Technology".☆38May 5, 2017Updated 8 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago
- Autoencoder based intrusion detection system trained and tested with the CICIDS2017 data set.☆40Jun 15, 2020Updated 5 years ago
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆47Jun 13, 2022Updated 3 years ago
- Web Application Firewall Benchmark☆12May 14, 2022Updated 3 years ago
- Google Inception-V3 with Keras☆11Feb 17, 2018Updated 8 years ago
- Comparing Anomaly-Based Network Intrusion Detection Approaches Under Practical Aspects☆11Mar 25, 2023Updated 2 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- Light-weight real-time multi-object detection and tracking in Nvidia TX2☆10May 10, 2019Updated 6 years ago
- The Trader Gateway of Distributed Commodities OTC Electronic Trading System☆13Jun 12, 2018Updated 7 years ago
- An analysis of the released data on FinCrime Files transactions as depicted on SARs.☆10Nov 26, 2020Updated 5 years ago
- Reaque is an mobile tool where we can share and find things related to Mozambique, the people and things there. From reflections and cult…☆13Sep 10, 2019Updated 6 years ago
- A small CTFd plugin to send notifications about solves and admin announcements to Slack/Discord/Telegram☆13Oct 20, 2021Updated 4 years ago
- Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R.…☆29May 20, 2015Updated 10 years ago
- Network Intrusion Detection System using Deep Learning Techniques☆172Dec 15, 2019Updated 6 years ago
- [ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection☆174Mar 24, 2023Updated 2 years ago
- This repository contains the codes and figures used in the paper "Illuminating Dark Fishing Fleets in North Korea", published in Science …☆16Oct 11, 2020Updated 5 years ago