A Network Anomaly Detection system that leverages machine learning to monitor and identify unusual activities in network traffic in real-time. This project is designed to enhance network security by providing early detection of potential threats and anomalies.
☆26Jun 19, 2024Updated last year
Alternatives and similar repositories for network-anomaly-detection
Users that are interested in network-anomaly-detection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This project is an AI-powered Security Information and Event Management (SIEM) system designed for real-time threat detection and respons…☆21Nov 10, 2024Updated last year
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆26Sep 29, 2024Updated last year
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆118Oct 19, 2023Updated 2 years ago
- 基于 CNN + LSTM 的网络流量检测☆23Mar 30, 2023Updated 3 years ago
- 基于神经网络的流量异常检测☆153Jul 28, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆48Sep 24, 2022Updated 3 years ago
- 机器学习流量检测webshell-基于深度包检测技术和贝叶斯算法的webshell检查程序☆57Sep 16, 2019Updated 6 years ago
- Real-time Intrusion Detection System implementing Machine Learning. We combine Supervised Learning (RF) for detecting known attacks from …☆81Jun 9, 2025Updated 10 months ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 7 years ago
- ☆152Mar 30, 2023Updated 3 years ago
- 基于机器学习的入侵检测系统☆84Feb 1, 2020Updated 6 years ago
- Flow Interaction Graph based attack traffic detection system.☆189May 6, 2024Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Jan 24, 2023Updated 3 years ago
- 基于机器学习的恶意加密流量监测平台☆147May 16, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆408Apr 1, 2026Updated last week
- A network intrusion detection system based on incremental statistics (AfterImage) and an ensemble of autoencoders (KitNET)☆379Mar 24, 2026Updated 2 weeks ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆238Nov 16, 2022Updated 3 years ago
- FAME Automates Malware Evaluation☆936Dec 16, 2025Updated 3 months ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆1,833Feb 13, 2026Updated last month
- Hacking resources and cheat sheets. References, tools, scripts, tutorials, and other resources that help offensive and defensive security…☆2,431Jun 25, 2024Updated last year
- A repository of sysmon configuration modules☆3,007Aug 21, 2024Updated last year
- Tutorials, examples, discussions, research proposals, and other resources related to fuzzing☆3,756Oct 24, 2024Updated last year
- A curated list of project tutorials for project-based learning.☆5,752Nov 15, 2025Updated 4 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Sysmon configuration file template with default high-quality event tracing☆5,453Jul 3, 2024Updated last year
- Open Source Vulnerability Management Platform☆6,324Feb 13, 2026Updated last month
- Automated Adversary Emulation Platform☆6,886Updated this week
- Machine Learning for Cyber Security☆8,410Aug 19, 2024Updated last year
- (⌐■_■) - Deep Reinforcement Learning instrumenting bettercap for WiFi pwning.☆9,017Aug 23, 2025Updated 7 months ago
- an awesome list of honeypot resources☆10,252Apr 1, 2025Updated last year
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,189Jan 11, 2026Updated 3 months ago
- Fast and memory-efficient exact attention☆23,185Updated this week
- DevOps Roadmap for 2026. with learning resources☆19,159Feb 26, 2026Updated last month
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆17,329Dec 15, 2024Updated last year
- ⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡☆21,300Updated this week
- A little tool to play with Windows security☆21,380May 11, 2025Updated 11 months ago
- A curated list of awesome Deep Learning tutorials, projects and communities.☆27,863May 26, 2025Updated 10 months ago
- A curated list of free courses with certifications. Also available at https://free-certifications.com/☆53,860Jul 22, 2025Updated 8 months ago
- Manually curated collection of resources for frontend web developers.☆46,362May 21, 2024Updated last year
- The 30 Days of Python programming challenge is a step-by-step guide to learn the Python programming language in 30 days. This challenge m…☆60,787Apr 4, 2026Updated last week