Hashehri/Network-Traffic-Classification-UNSW-NB15
Binary Classification for detecting intrusion network attacks. In order, to emphasize how a network packet with certain features may have the potentials to become a serious threat to the network.
This project helps network security professionals and IT administrators automatically detect malicious activity within their network traffic. It takes raw network packet data with various features (like duration, protocols, and byte counts) and outputs a classification indicating whether the traffic is normal or a potential attack. This helps identify threats like brute force, denial of service, or internal infiltration.
No commits in the last 6 months.
Use this if you need to build or enhance an intrusion detection system that can identify sophisticated and evolving network attacks based on real-time traffic patterns.
Not ideal if you are looking for a complete, production-ready intrusion prevention system that actively blocks threats, as this project focuses solely on detection and classification.
Stars
29
Forks
9
Language
Jupyter Notebook
License
—
Category
Last pushed
Dec 19, 2021
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/Hashehri/Network-Traffic-Classification-UNSW-NB15"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
AIS-Package/aisp
Artificial Immune Systems Package (AISP) is an open-source Python library that features...
ubc-provenance/PIDSMaker
A framework for building provenance-based intrusion detection systems with neural networks
Western-OC2-Lab/Intrusion-Detection-System-Using-Machine-Learning
Code for IDS-ML: intrusion detection system development using machine learning algorithms...
zimingttkx/Network-Security-Based-On-ML
基于机器学习的网络安全检测系统 | 集成Kitsune/LUCID算法 | 支持ML/DL/RL模型 | 99.58%攻击检测准确率 | 19913 QPS | Docker/K8s部署
abhinav-bhardwaj/Network-Intrusion-Detection-Using-Machine-Learning
A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach