crescentsalam16 Goto Github PK
Type: User
Type: User
I'm now a ALX Student, this is my first repository as a C beginner programmer
I'm now a ALX Student, this is my first repository as a full-stack engineer
I'm now a ALX Student, this is Shell, basics repository as a full-stack engineer
I'm now a ALX Student, this is my first repository as a full-stack engineer
Config files for my GitHub profile.
DDoS detection in SDN
Decision Tree from Scratch in Python
I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.unb.ca/cic/datasets/ids-2017.html. By keeping Monday as the training set and rest of the csv files as testing set, I tried one class SVM and deep CNN model to check how it works. Here the Monday dataset contains only normal data and rest of the days contains both normal and attacked data. Also, from the same university (UNB) for the Tor and Non Tor dataset, I tried K-means clustering and Stacked LSTM models in order to check the classification of multiple labels.
IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including perhaps insider.
A network data classifier for UNSW-NB15 data set. This is an university course work for "ITKST42 Information Security Technology".
2018 Java_Intrusion-Detection-System in CIT built from scratch
Java Based Network Intusion Detection System + Synopsis
Example of the use of a sample jaya optimization algorithm in a metamorphic malware solution
creating machine learning algorithms in java for training and testing the NSL-KDD dataset for intrusion detection system.
We have Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R Java is used to prepare datasets. R is used to implement a neural network. Weka is used for data cleaning. We created two files. One to detect anomaly based attacks and other to detect misuse based attacks. These files have around 4500 instances. The input is divided into a Training Data Set (75%) and Test Data Set (25%).
Network Intrusion Detection System prediction block, written in R using kDD and NSL datasets.
Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R. Java is used to prepare DataSets. R is used implement a neural network. Weka is used for data cleaning.
Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Intrusion detection system (KDD dataset) with JAYA algorithm
Hamoye
Team Project by Yahaya Abbas Yakubu and Umar Baba Umar
Reworking
This is a simple application of TensorFlow Extended(TFX) platform for network anomaly detection using InSDN 2020 Dataset.
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.