All Projects → vinayakumarr → Network Intrusion Detection

vinayakumarr / Network Intrusion Detection

Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Network Intrusion Detection

Violent Python3
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 603 (+99.01%)
Mutual labels:  cybersecurity, network-security
SuperLibrary
Information Security Library
Stars: ✭ 60 (-80.2%)
Mutual labels:  cybersecurity, network-security
Nfstream
NFStream: a Flexible Network Data Analysis Framework.
Stars: ✭ 622 (+105.28%)
Mutual labels:  cybersecurity, network-security
PoW-Shield
Project dedicated to fight Layer 7 DDoS with proof of work, featuring an additional WAF. Completed with full set of features and containerized for rapid and lightweight deployment.
Stars: ✭ 99 (-67.33%)
Mutual labels:  cybersecurity, network-security
Blackhat Python3
Source code for the book "Black Hat Python" by Justin Seitz. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues involving the implementation of deprecated libraries.
Stars: ✭ 1,125 (+271.29%)
Mutual labels:  cybersecurity, network-security
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-87.46%)
Mutual labels:  cybersecurity, network-security
Writeups
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-79.87%)
Mutual labels:  cybersecurity
Security Onion
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+875.58%)
Mutual labels:  intrusion-detection
ReversePowerShell
Functions that can be used to gain Reverse Shells with PowerShell
Stars: ✭ 48 (-84.16%)
Mutual labels:  cybersecurity
pycommunityid
A Python implementation of the Community ID flow hashing standard
Stars: ✭ 18 (-94.06%)
Mutual labels:  network-security
Psad
psad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (-1.65%)
Mutual labels:  intrusion-detection
Attack Scripts
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Stars: ✭ 290 (-4.29%)
Mutual labels:  cybersecurity
Fpnd
Python package for freepn network daemon
Stars: ✭ 271 (-10.56%)
Mutual labels:  network-security
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-69.97%)
Mutual labels:  cybersecurity
Cyberscan
CyberScan: Network's Forensics ToolKit
Stars: ✭ 280 (-7.59%)
Mutual labels:  network-security
FakeUSB
Make your own BadUSB device!
Stars: ✭ 14 (-95.38%)
Mutual labels:  cybersecurity
Chepy
Chepy is a python lib/cli equivalent of the awesome CyberChef tool.
Stars: ✭ 295 (-2.64%)
Mutual labels:  cybersecurity
wifi-deauther
A fully automatic wifi deauther coded in Python
Stars: ✭ 25 (-91.75%)
Mutual labels:  cybersecurity
Expose
An Intrusion Detection System library loosely based on PHP IDS
Stars: ✭ 255 (-15.84%)
Mutual labels:  intrusion-detection
Subzy
Subdomain takeover vulnerability checker
Stars: ✭ 287 (-5.28%)
Mutual labels:  cybersecurity

Network-Intrusion-Detection

Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15

DOI

KDDCup '99': http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

NSL-KDD: http://www.unb.ca/cic/datasets/nsl.html

UNSW-NB15: https://www.unsw.adfa.edu.au/australian-centre-for-cyber-security/cybersecurity/ADFA-NB15-Datasets/

Please cite the following papers, if you use the code as part of your research

  1. R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran: Applying convolutional neural network for network intrusion detection. ICACCI 2017: 1222-1228 https://ieeexplore.ieee.org/abstract/document/8126009

  2. R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran: Evaluating effectiveness of shallow and deep networks to intrusion detection system. ICACCI 2017: 1282-1289 https://ieeexplore.ieee.org/document/8126018

  3. R. Vinayakumar, K. P. Soman, Prabaharan Poornachandran: Evaluation of Recurrent Neural Network and its variants for Intrusion Detection System (IDS)" has accepted in Special Issue On Big Data Searching, Mining, Optimization & Securing (BSMOS) Peer to Peer Cloud Based Networks in IJISMD https://www.igi-global.com/article/evaluation-of-recurrent-neural-network-and-its-variants-for-intrusion-detection-system-ids/204371

  4. Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access, 7, 41525-41550. https://ieeexplore.ieee.org/abstract/document/8681044

  5. Vinayakumar, R., Soman, K. P., & Poornachandran, P. (2019). A Comparative Analysis of Deep Learning Approaches for Network Intrusion Detection Systems (N-IDSs): Deep Learning for N-IDSs. International Journal of Digital Crime and Forensics (IJDCF), 11(3), 65-89. https://www.igi-global.com/article/a-comparative-analysis-of-deep-learning-approaches-for-network-intrusion-detection-systems-n-idss/227640

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].