Western-OC2-Lab/Intrusion-Detection-System-Using-CNN-and-Transfer-Learning
Code for intrusion detection system (IDS) development using CNN models and transfer learning
This project helps cybersecurity engineers and automotive security researchers build advanced intrusion detection systems for connected vehicles. It takes network traffic data or vehicle sensor data (like CAN bus data) as input and outputs a highly accurate system capable of identifying cyber-attacks. The primary users are security specialists working with Internet of Vehicles (IoV) systems who need robust defenses against new threats.
199 stars. No commits in the last 6 months.
Use this if you need to develop a high-performance intrusion detection system for vehicular networks, leveraging deep learning to achieve over 99% detection rates.
Not ideal if you are looking for a pre-built, ready-to-deploy intrusion detection product rather than a toolkit for developing one, or if you prefer traditional machine learning models over deep learning.
Stars
199
Forks
47
Language
Jupyter Notebook
License
MIT
Category
Last pushed
Apr 21, 2023
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/Western-OC2-Lab/Intrusion-Detection-System-Using-CNN-and-Transfer-Learning"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
AIS-Package/aisp
Artificial Immune Systems Package (AISP) is an open-source Python library that features...
ubc-provenance/PIDSMaker
A framework for building provenance-based intrusion detection systems with neural networks
Western-OC2-Lab/Intrusion-Detection-System-Using-Machine-Learning
Code for IDS-ML: intrusion detection system development using machine learning algorithms...
zimingttkx/Network-Security-Based-On-ML
基于机器学习的网络安全检测系统 | 集成Kitsune/LUCID算法 | 支持ML/DL/RL模型 | 99.58%攻击检测准确率 | 19913 QPS | Docker/K8s部署
abhinav-bhardwaj/Network-Intrusion-Detection-Using-Machine-Learning
A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach