zongchuanlin / Network-intrusion-detection-based-on-CNN
Tensorflow环境下,基于CNN算法,KD99与网络数据训练集共3000w数据训练,在19w数据与1w攻检验下,模型准确率为92.8%.
☆60Updated 2 years ago
Alternatives and similar repositories for Network-intrusion-detection-based-on-CNN:
Users that are interested in Network-intrusion-detection-based-on-CNN are comparing it to the libraries listed below
- Using Wasserstein Generative Adversarial Network to fool intrusion detection systems (IDS) into believing that malicious traffic is norma…☆71Updated last year
- use sklearn to detect two types of network attacks☆30Updated 5 years ago
- This data set contains flow-based network security data sets extracted from satellite networks and terrestrial networks. We named the dat…☆22Updated 4 years ago
- ☆38Updated 4 years ago
- Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.☆15Updated last year
- ☆17Updated 4 months ago
- DGDATA: Deep Generative Domain Adaptation with Temporal Relation Attention Mechanism for Cross-User Activity Recognition☆7Updated 6 months ago
- A benchmark for logging statement generation.☆19Updated 4 months ago
- Deep learning models for network intrusion detection☆34Updated last year
- ☆39Updated 2 years ago
- Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution☆44Updated 8 months ago
- DistributedNIDS-Framework is an open-source distributed intrusion detection system, combining the Snort engine with Apache Spark's data p…☆21Updated 2 months ago
- Here, we use RNN to deal with the network intrusion problem. The UNSW-NB15 dataset is used.☆68Updated 4 years ago
- This is the public code repository for the paper 'Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage …☆9Updated last month
- This repository is a proof of concept of algorithms described in T-DFNN: An Incremental Learning Algorithm for Intrusion Detection System…☆13Updated 2 years ago
- Kevin, I., et al. "Federated Learning with Clustering-Based Participant Selection for IoT Applications." 2022 IEEE International Conferen…☆11Updated 7 months ago
- 2d game, a birthday present for my girl friend, the game prototype is Magic Tower☆27Updated 2 months ago
- GLT has presented the first attempt to accelerate GNN inference. Though promising, GLT encounters robustness and generalization issues wh…☆28Updated 11 months ago
- Anomaly based Instrusion Detection System using RNN-LSTMs. Datasets include NSL-KDD and UNSW-NB15.☆33Updated 4 years ago
- Crack Vigenere Ciphertext using statistic method (Index of Coincidence and Chi-square)☆16Updated last year
- ☆77Updated 2 months ago
- Practical Detection of Trojan Neural Networks☆119Updated 4 years ago
- Pytorch implementation of LuNet: A Deep Neural Network for Network Intrusion Detection☆53Updated 4 years ago
- A framework for implementing federated learning☆32Updated 4 years ago
- 机器学习作业,机器学习和深度学习方法实现入侵检测☆34Updated 2 years ago
- ⼀个有潜⼒的⽹络⼊侵检测算法,引⼊了乘法注意⼒机制将其融合到 CNN 的分类模型中,在KDD99和UNSM-NB15数据集进行模型的训练结果优于一般机器学习方法和CNN。A promising network intrusion detection algorithm is…☆9Updated last year
- An Intrusion Detection System based on Deep Belief Networks☆80Updated 2 years ago
- ☆15Updated 2 months ago
- JavaScript学习笔记☆9Updated last year
- 💄「小鸣助手」项目 Web 端源码,使用 Angular 框架☆27Updated last year