Network-Intrusion-Detection-Using-Machine-Learning-Techniques and NSL-KDD-Network-Intrusion-Detection

Both tools are competitors, as they both offer implementations of various machine learning algorithms for network intrusion detection, with the choice likely depending on the specific algorithms or dataset handling preferred by the user.

Maintenance 0/25
Adoption 9/25
Maturity 16/25
Community 21/25
Maintenance 0/25
Adoption 9/25
Maturity 16/25
Community 21/25
Stars: 102
Forks: 44
Downloads:
Commits (30d): 0
Language: Jupyter Notebook
License: MIT
Stars: 97
Forks: 45
Downloads:
Commits (30d): 0
Language: Jupyter Notebook
License: GPL-3.0
Stale 6m No Package No Dependents
Stale 6m No Package No Dependents

About Network-Intrusion-Detection-Using-Machine-Learning-Techniques

dimtics/Network-Intrusion-Detection-Using-Machine-Learning-Techniques

Network intrusions classification using algorithms such as Support Vector Machine (SVM), Decision Tree, Naive Baye, K-Nearest Neighbor (KNN), Logistic Regression and Random Forest.

This project helps network security analysts automatically classify different types of network intrusions to protect systems more effectively. It takes in raw network traffic data and outputs a classification of the intrusion type, such as DoS or probing, helping security teams quickly identify and respond to threats. This is designed for network defenders and security operations center (SOC) personnel.

network-security cybersecurity intrusion-detection security-operations threat-analysis

About NSL-KDD-Network-Intrusion-Detection

Mamcose/NSL-KDD-Network-Intrusion-Detection

Machine Learning Algorithms on NSL-KDD dataset

This project helps network security professionals identify cyberattacks by analyzing network traffic data. It takes raw network connection logs as input and outputs classifications of whether a connection is normal or an intrusion, helping to flag suspicious activity. This is intended for network administrators, security analysts, or anyone responsible for maintaining network integrity.

network-security cybersecurity intrusion-detection network-monitoring threat-analysis

Scores updated daily from GitHub, PyPI, and npm data. How scores work