A Network Anomaly Detection system that leverages machine learning to monitor and identify unusual activities in network traffic in real-time. This project is designed to enhance network security by providing early detection of potential threats and anomalies.
☆25Jun 19, 2024Updated last year
Alternatives and similar repositories for network-anomaly-detection
Users that are interested in network-anomaly-detection are comparing it to the libraries listed below
Sorting:
- The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Theref…☆16Oct 2, 2020Updated 5 years ago
- Replication of Jay Sinha's Efficient Deep CNN-BiLSTM model for network intrusion detection using NSL-KDD and UNSW-NB15 datasets to unders…☆17Aug 25, 2024Updated last year
- 基于snort base mysql 的入侵检测系统☆11Jun 19, 2023Updated 2 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.☆25Sep 29, 2024Updated last year
- 基于SDN架构的网络流量监控和控制☆12Feb 2, 2026Updated last month
- This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showca…☆114Oct 19, 2023Updated 2 years ago
- This is a simple DNN based application for an IDS based on the CICIDS2017 dataset☆39Aug 8, 2020Updated 5 years ago
- A project using Django, sklearn and pandas to detect anomalies in network traffic using machine learning☆47Jun 13, 2022Updated 3 years ago
- the DL methods used are : DNN, CNN, LSTM, GRU, CNN-LSTM, CNN-GRU, CNN-BiLSTM, CNN-BiGRU, the dataset used is : imbalanced NSL-KDD (KDDTra…☆48Sep 24, 2022Updated 3 years ago
- 机器学习流量检测webshell-基于深度包检测技术和贝叶斯算法的webshell检查程序☆57Sep 16, 2019Updated 6 years ago
- 使用机器学习的恶意加密流量识别系统☆51Jan 8, 2024Updated 2 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆73Mar 22, 2019Updated 7 years ago
- 基于机器学习的恶意加密流量监测平台☆148May 16, 2021Updated 4 years ago
- A thesis submitted for the degree of Master of Science in Computer Networks and Security☆237Nov 16, 2022Updated 3 years ago
- Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors i…☆861Updated this week
- Free, ultrafast Copilot alternative for Emacs☆630Jun 27, 2025Updated 8 months ago
- A MCP server for using Semgrep to scan code for security vulnerabilities.☆641Oct 28, 2025Updated 4 months ago
- AI-powered ffuf wrapper☆651Dec 4, 2025Updated 3 months ago
- Basics on commands/tools/info on how to assess the security of mobile applications☆1,652Dec 19, 2023Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆1,825Feb 13, 2026Updated last month
- A list of resources for those interested in getting started in bug bounties☆11,906Jul 23, 2024Updated last year
- open-source multimodal large language model that can hear, talk while thinking. Featuring real-time end-to-end speech input and streaming…☆3,534Nov 5, 2024Updated last year
- 爆破字典☆5,272Mar 21, 2022Updated 4 years ago
- PowerShell Obfuscator☆4,218Aug 10, 2023Updated 2 years ago
- A curated list of hacking environments where you can train your cyber skills legally and safely☆4,253Jul 2, 2024Updated last year
- Sysmon configuration file template with default high-quality event tracing☆5,430Jul 3, 2024Updated last year
- Malicious traffic detection system☆8,329Updated this week
- Automated Adversary Emulation Platform☆6,831Updated this week
- Machine Learning for Cyber Security☆8,315Aug 19, 2024Updated last year
- Self-Hosting Guide. Learn all about locally hosting (on premises & private web servers) and managing software applications by yourself o…☆18,986Jun 27, 2025Updated 8 months ago
- an awesome list of honeypot resources☆10,209Apr 1, 2025Updated 11 months ago
- Pre-Built Vulnerable Environments Based on Docker-Compose☆20,399Updated this week
- real time face swap and one-click video deepfake with only a single image☆80,121Mar 13, 2026Updated last week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,912Aug 17, 2020Updated 5 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆14,117Jan 11, 2026Updated 2 months ago
- Fast and memory-efficient exact attention☆22,832Updated this week
- Starter files, final projects, and FAQ for my Complete JavaScript course☆17,088Dec 10, 2024Updated last year
- SOTA Open Source TTS☆28,614Updated this week
- 30 Days of React challenge is a step by step guide to learn React in 30 days. These videos may help too: https://www.youtube.com/channe…☆27,349Dec 6, 2025Updated 3 months ago