Coder Social home page Coder Social logo

idsdatasets's Projects

cicflowmeter icon cicflowmeter

CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is an Ethernet traffic Bi-flow generator and analyzer for anomaly detection that has been used in many Cybersecurity datsets such as Android Adware-General Malware dataset (CICAAGM2017), IPS/IDS dataset (CICIDS2017), Android Malware dataset (CICAndMal2017) and Distributed Denial of Service (CICDDoS2019).

cicids-2017-intrution-detection- icon cicids-2017-intrution-detection-

Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs) are the most important defense tools against the sophisticated and ever-growing network attacks. Due to the lack of reliable test and validation datasets, anomaly-based intrusion detection approaches are suffering from consistent and accurate performance evolutions. Our evaluations of the existing eleven datasets since 1998 show that most are out of date and unreliable. Some of these datasets suffer from the lack of traffic diversity and volumes, some do not cover the variety of known attacks, while others anonymize packet payload data, which cannot reflect the current trends. Some are also lacking feature set and metadata. CICIDS2017 dataset contains benign and the most up-to-date common attacks, which resembles the true real-world data (PCAPs). It also includes the results of the network traffic analysis using CICFlowMeter with labeled flows based on the time stamp, source, and destination IPs, source and destination ports, protocols and attack (CSV files). Also available is the extracted features definition. Generating realistic background traffic was our top priority in building this dataset. We have used our proposed B-Profile system (Sharafaldin, et al. 2016) to profile the abstract behavior of human interactions and generates naturalistic benign background traffic. For this dataset, we built the abstract behaviour of 25 users based on the HTTP, HTTPS, FTP, SSH, and email protocols. The data capturing period started at 9 a.m., Monday, July 3, 2017 and ended at 5 p.m. on Friday July 7, 2017, for a total of 5 days. Monday is the normal day and only includes the benign traffic. The implemented attacks include Brute Force FTP, Brute Force SSH, DoS, Heartbleed, Web Attack, Infiltration, Botnet and DDoS. They have been executed both morning and afternoon on Tuesday, Wednesday, Thursday and Friday.

cicids2017-ml icon cicids2017-ml

The purpose of this repository is to demonstrate the steps of processing CICIDS2017 dataset using machine learning algorithms.

dnn_ensemble_ids icon dnn_ensemble_ids

DNN-Ensemble IDS is a machine learning based classification model for intrusion detection exploiting ensembles of classifiers.

ids icon ids

Intrusion Detection System using machine learning

intrusion-detection-system-adversarial-attacks- icon intrusion-detection-system-adversarial-attacks-

Network Intrusion Detection System on CSE-CIC-IDS2018 using ML classifiers and DNN ( ANN , CNN , RNN ) | Hyper-parameter Optimization { learning rate, epochs, network architectures, regularisation } | Adversarial Attacks - Label flip , Adversarial samples , KNN (defence)

intrusion-detection-using-deep-learning-and-machine-learning icon intrusion-detection-using-deep-learning-and-machine-learning

Network related services, programs and applications are developing greatly, however, network security breaches are also developing with them. Network security is an evolving, challenging and a critical task. It is essential that there is a system in place to identify any harmful movement happening in network. An Intrusion detection system (IDS) has become the prerequisite software addressing cyber security in the modern era. Especially, with the greater complexity of advanced cyber-attacks and as such the uncertainty surrounding the detection of the types of attacks. This thesis proposes a novel approach using an ensemble of K-Means and Gaussian Mixture clustering combined with a deep neural network (DNN) algorithm. When compared with traditional artificial neural network’s (ANN’s) used within an IDS, our approach implements modern advances in deep learning such as initialising the parameters through the unsupervised pre-training clustering ensemble, therefore improving the detection accuracy. We hope our results will show that the proposed approach can provide a real-time response to the attack with a greatly increased detection ratio for false flags.

joy icon joy

A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.

sf-soinn-ids icon sf-soinn-ids

A network Intrusion Detection System (IDS) based on Self-Organizing Neural Networks (SOINN).

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.