Giter Site home page Giter Site logo

crescentsalam16's Projects

alx-pre_course icon alx-pre_course

I'm now a ALX Student, this is my first repository as a full-stack engineer

alx-zero_day icon alx-zero_day

I'm now a ALX Student, this is my first repository as a full-stack engineer

intrusion-detection-system icon intrusion-detection-system

I have tried some of the machine learning and deep learning algorithm for IDS 2017 dataset. The link for the dataset is here: http://www.unb.ca/cic/datasets/ids-2017.html. By keeping Monday as the training set and rest of the csv files as testing set, I tried one class SVM and deep CNN model to check how it works. Here the Monday dataset contains only normal data and rest of the days contains both normal and attacked data. Also, from the same university (UNB) for the Tor and Non Tor dataset, I tried K-means clustering and Stacked LSTM models in order to check the classification of multiple labels.

intrusion-detection-system-1 icon intrusion-detection-system-1

IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including perhaps insider.

ml-java-ids icon ml-java-ids

creating machine learning algorithms in java for training and testing the NSL-KDD dataset for intrusion detection system.

network-intrusion-detection-system icon network-intrusion-detection-system

We have Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R Java is used to prepare datasets. R is used to implement a neural network. Weka is used for data cleaning. We created two files. One to detect anomaly based attacks and other to detect misuse based attacks. These files have around 4500 instances. The input is divided into a Training Data Set (75%) and Test Data Set (25%).

network-intrusion-detection-system-2 icon network-intrusion-detection-system-2

Designed and developed an anomaly and misuse based intrusion detection system using neural networks. Technologies used: Java Weka and R. Java is used to prepare DataSets. R is used implement a neural network. Weka is used for data cleaning.

nids-intrusion-detection icon nids-intrusion-detection

Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN

nids_jaya icon nids_jaya

Intrusion detection system (KDD dataset) with JAYA algorithm

printf icon printf

Team Project by Yahaya Abbas Yakubu and Umar Baba Umar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.