A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.
-
Updated
Jul 8, 2020 - Jupyter Notebook
A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.
Code for PerCom paper 'Edge2Guard: Botnet Attacks Detecting Offline Models for Resource-Constrained IoT Devices'
Scripts to analyze the CAM-LDS using LLMs
Hybrid Machine Learning and Rule-Based Phishing Detection System. Implements URL-based feature engineering and heuristic attack type classification using Random Forest and XGBoost.
🐺 Post-quantum adaptive-behavioral oracle on PG(11,4). Beast 6: 8 Mordidas + Blood Eagle + Viking Frost + Aikido. The wolf watches, learns, bites. 3/3 GO — Gemini 9.8 · ChatGPT 9.3 · Grok 9.7. Pure Python 3, 0.136ms/query, zero deps. BSL 1.1 + Fenrir Clause.
Add a description, image, and links to the attack-classification topic page so that developers can more easily learn about it.
To associate your repository with the attack-classification topic, visit your repo's landing page and select "manage topics."