Intrusion-Detection-System-Using-Machine-Learning and Network-Intrusion-Detection-Using-Machine-Learning-Techniques

Maintenance 2/25
Adoption 10/25
Maturity 16/25
Community 25/25
Maintenance 0/25
Adoption 9/25
Maturity 16/25
Community 21/25
Stars: 573
Forks: 155
Downloads:
Commits (30d): 0
Language: Jupyter Notebook
License: MIT
Stars: 102
Forks: 44
Downloads:
Commits (30d): 0
Language: Jupyter Notebook
License: MIT
Stale 6m No Package No Dependents
Stale 6m No Package No Dependents

About Intrusion-Detection-System-Using-Machine-Learning

Western-OC2-Lab/Intrusion-Detection-System-Using-Machine-Learning

Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGBoost, stacking, k-means, Bayesian optimization..)

This project helps cybersecurity professionals and network engineers identify cyber-attacks in connected vehicle networks. It takes network traffic data as input and outputs classifications of known or unknown intrusion attempts. The end-user persona is likely a security analyst or an operations engineer responsible for securing Internet of Vehicles (IoV) infrastructure.

vehicular-cybersecurity intrusion-detection network-monitoring automotive-security iot-security

About Network-Intrusion-Detection-Using-Machine-Learning-Techniques

dimtics/Network-Intrusion-Detection-Using-Machine-Learning-Techniques

Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (KNN), Logistic Regression and Random Forest.

This project helps network security analysts automatically classify different types of network intrusions to protect systems more effectively. It takes in raw network traffic data and outputs a classification of the intrusion type, such as DoS or probing, helping security teams quickly identify and respond to threats. This is designed for network defenders and security operations center (SOC) personnel.

network-security cybersecurity intrusion-detection security-operations threat-analysis

Scores updated daily from GitHub, PyPI, and npm data. How scores work