├── .gitignore ├── README.md ├── bachelorthesis_axel_faes_final.pdf ├── code ├── configs │ ├── main │ │ ├── bayesian.json │ │ ├── config.json │ │ ├── config_binary_knn.json │ │ ├── config_learning.json │ │ ├── country_complete.json │ │ ├── db.json │ │ ├── demo.json │ │ ├── features.json │ │ ├── good.txt │ │ ├── knn.json │ │ ├── knn_distance.json │ │ ├── knn_other.json │ │ ├── linear_svm.json │ │ ├── log.txt │ │ ├── neural.json │ │ ├── nonlinear-svm.json │ │ ├── one_class_svm.json │ │ ├── protocols.json │ │ ├── random.json │ │ ├── test.json │ │ └── tree.json │ ├── testing.json │ └── testing.txt ├── logs │ ├── log_country │ │ ├── knn_country.txt │ │ ├── lin.txt │ │ ├── neural.txt │ │ ├── oneclass.txt │ │ ├── svm.txt │ │ └── tree.txt │ ├── logs_flags │ │ ├── bayesian.txt │ │ ├── knn_flags.txt │ │ ├── linsvm.txt │ │ ├── neural.txt │ │ ├── oneclass.txt │ │ ├── svm.txt │ │ └── tree.txt │ ├── logs_normal │ │ ├── bayes_2runs.txt │ │ ├── knn.txt │ │ ├── knn_binary_experiment.txt │ │ ├── knn_distance.txt │ │ ├── knn_other.txt │ │ ├── lin.txt │ │ ├── neural.txt │ │ ├── oneclass.txt │ │ ├── random.txt │ │ ├── svm.txt │ │ └── tree.txt │ ├── logs_old_deprecated │ │ ├── bayes.txt │ │ ├── knn.txt │ │ ├── knn_uniform.txt │ │ ├── lin_svm.txt │ │ ├── neural.txt │ │ ├── nonlin_svm.txt │ │ ├── oneclass.txt │ │ ├── random.txt │ │ ├── random2.txt │ │ ├── tcp.txt │ │ └── tree.txt │ └── logs_tcp_2runs │ │ ├── bayes.txt │ │ ├── knn.txt │ │ ├── lin.txt │ │ ├── neural.txt │ │ ├── oneclass.txt │ │ ├── svm.txt │ │ └── tree.txt ├── models │ ├── demo │ │ └── model │ │ │ ├── model.mdl │ │ │ ├── model.mdl_01.npy │ │ │ ├── model.mdl_02.npy │ │ │ ├── model.mdl_03.npy │ │ │ ├── model.mdl_04.npy │ │ │ ├── model.mdl_05.npy │ │ │ ├── model.mdl_06.npy │ │ │ ├── model.mdl_07.npy │ │ │ ├── model.mdl_08.npy │ │ │ └── model.mdl_09.npy │ └── model │ │ └── .gitfolder ├── pip_requirements_unix.txt └── src │ ├── calc.py │ ├── calc_stat.py │ ├── config.py │ ├── feature.py │ ├── flow.py │ ├── load_country.py │ ├── load_sql.py │ ├── loader.py │ ├── logger.py │ ├── main.py │ ├── ml.py │ ├── prediction_type.py │ ├── predictor.py │ ├── pynfdump_src.py │ ├── result.py │ ├── sniffer.py │ ├── testing.py │ ├── train.py │ └── visualise.py ├── documents ├── demo.pdf ├── latex-article-nl │ ├── project.tex │ └── vulgariserend_artikel_axel_faes.pdf ├── latex-experiments │ ├── BachelorThesis.cls │ ├── Chapters │ │ ├── Baseline.tex │ │ ├── Bayes.tex │ │ ├── ChapterTemplate.tex │ │ ├── Introduction.tex │ │ ├── KNN.tex │ │ ├── LinSvm.tex │ │ ├── NeuralNet.tex │ │ ├── OneClass.tex │ │ ├── Svm.tex │ │ └── Tree.tex │ ├── LOGO.jpg │ ├── main_correct_template.pdf │ └── main_correct_template.tex ├── latex-thesis │ ├── Appendices │ │ ├── AppendixTemplate.tex │ │ ├── Config.tex │ │ ├── Experiments.tex │ │ ├── Framework.tex │ │ ├── Meetings.tex │ │ └── Review.tex │ ├── BachelorThesis.cls │ ├── Chapters │ │ ├── Algorithms.tex │ │ ├── Attacks.tex │ │ ├── ChapterTemplate.tex │ │ ├── Conclusion.tex │ │ ├── Evaluation.tex │ │ ├── Flow.tex │ │ ├── FutureWork.tex │ │ ├── IDS.tex │ │ ├── Implementation.tex │ │ ├── Introduction.tex │ │ ├── ML-IDS.tex │ │ ├── ML.tex │ │ ├── Samenvatting.tex │ │ ├── Techniques.tex │ │ └── Validation.tex │ ├── Figures │ │ ├── AI2.png │ │ ├── Anomaly-based-Intrusion-Detection-System.jpg │ │ ├── Apriori.png │ │ ├── DecisionTreeClassifier.png │ │ ├── DecisionTreeClassifier_700000.png │ │ ├── Gaussian_Naive_Bayes.png │ │ ├── IDS_IPS.jpg │ │ ├── KNN_only_botnet.png │ │ ├── KNeighborsClassifier_Distance.png │ │ ├── KNeighborsClassifier_Uniform.png │ │ ├── Linear_Support_Vector_Machine.png │ │ ├── NeuralNetwork.png │ │ ├── Plot_DecisionTreeClassifier.png │ │ ├── Plot_RandomClassifier.png │ │ ├── Signature-based-Intrusion-Detection-System.jpg │ │ ├── Support_Vector_Machine.png │ │ ├── anomaly.jpg │ │ ├── bagging.jpg │ │ ├── bias_variance_chart.jpg │ │ ├── bias_variance_chart.png │ │ ├── biasvariance.bmp │ │ ├── biasvariance.png │ │ ├── binclass.jpg │ │ ├── botnet.jpg │ │ ├── chebyshevDistance.png │ │ ├── classifierNoise.png │ │ ├── ctu13-1.jpg │ │ ├── ctu13-2.jpg │ │ ├── ctu13-3.jpg │ │ ├── ddos.png │ │ ├── decisiontreeExample.png │ │ ├── euclideanDistance.jpg │ │ ├── evaluation_learningcurve_knn.png │ │ ├── featureScale.png │ │ ├── featureScaleNot.png │ │ ├── gradient.png │ │ ├── hammingDistance.jpg │ │ ├── highvariance.png │ │ ├── idsdiagram.png │ │ ├── ip-api.png │ │ ├── kmeansExample.png │ │ ├── knn.png │ │ ├── knnExample.png │ │ ├── knnExample2.png │ │ ├── main_the_middle.jpg │ │ ├── manhattanDistance.jpg │ │ ├── minkowskiDistance.png │ │ ├── ml_algorithms.png │ │ ├── multiclass.png │ │ ├── netflow.png │ │ ├── neuralnet.jpeg │ │ ├── neuralnetmulti.png │ │ ├── normaldist.png │ │ ├── oneclasssvmExample.png │ │ ├── overfit.png │ │ ├── precisionrecall.png │ │ ├── snort.jpg │ │ └── svm.jpg │ ├── LOGO.jpg │ ├── MastersDoctoralThesis.cls │ ├── main.pdf │ ├── main.tex │ ├── main_correct_template.pdf │ ├── main_correct_template.tex │ └── references.bib ├── meetings │ ├── 2016-02-09 │ │ ├── 2016-02-09-meeting.pdf │ │ ├── project-blx (1).bib │ │ └── project.tex │ ├── 2016-02-12 │ │ ├── 2016-02-12-meeting.pdf │ │ └── project.tex │ ├── 2016-02-19 │ │ ├── 2016-02-19-meeting.pdf │ │ └── 2016-02-19-meeting.tex │ ├── 2016-02-26 │ │ ├── 2016-02-26-meeting.pdf │ │ ├── 2016-02-26-meeting.synctex (1).gz │ │ └── 2016-02-26-meeting.tex │ ├── 2016-03-04 │ │ ├── 2016-03-04-meeting (1).tex │ │ ├── 2016-03-04-meeting.pdf │ │ └── 2016-03-04-meeting.tex │ ├── 2016-03-08-presentatie.key │ ├── 2016-03-08-presentatie │ │ ├── 2016-03-08-presentatie.pdf │ │ └── 2016-03-08-presentatie.tex │ ├── 2016-03-11 │ │ ├── 2016-03-11-meeting.pdf │ │ └── 2016-03-11-meeting.tex │ ├── 2016-03-18 │ │ ├── 2016-03-18-meeting.pdf │ │ └── 2016-03-18-meeting.tex │ ├── 2016-03-24 │ │ ├── 2016-03-24-meeting.pdf │ │ ├── 2016-03-24-meeting.run (1).xml │ │ └── 2016-03-24-meeting.tex │ ├── 2016-04-01 │ │ ├── 2016-04-01-meeting.pdf │ │ └── 2016-04-01-meeting.tex │ ├── 2016-04-06-Cegeka │ │ ├── 2016-04-06-Cegeka-meeting.pdf │ │ └── 2016-04-06-Cegeka-meeting.tex │ ├── 2016-04-12 │ │ ├── 2016-04-12-meeting.pdf │ │ └── 2016-04-12-meeting.tex │ ├── 2016-04-18 │ │ ├── 2016-04-18-meeting.pdf │ │ └── 2016-04-18-meeting.tex │ ├── 2016-04-22 │ │ ├── 2016-04-18-meeting.pdf │ │ ├── 2016-04-22-meeting.pdf │ │ └── 2016-04-22-meeting.tex │ ├── 2016-04-29 │ │ ├── 2016-04-29-meeting.pdf │ │ └── 2016-04-29-meeting.tex │ ├── 2016-05-04 │ │ ├── 2016-05-04-meeting.pdf │ │ └── 2016-05-04-meeting.tex │ └── Presentatie-Cegeka.pdf ├── poster.pages ├── poster_sources.txt ├── reference-material │ ├── AI2_Paper.pdf │ ├── Practical_Malware_Analysis.pdf │ ├── leidraad_bachelorproef_2015-2016.pdf │ ├── notread │ │ ├── 10.1.1.402.6779.pdf │ │ ├── 1210ijcsit13.pdf │ │ ├── 1820-02141400035A.pdf │ │ ├── 23d75be621a6acec5fc369295ee77b3fbf49.pdf │ │ ├── 35-o-jayveer_singh-A_Survey_on_Machine.pdf │ │ ├── A Review of Intrusion Detection System.pdf │ │ ├── FULLTEXT01.pdf │ │ ├── NMRG-2.pdf │ │ ├── a23-beaver.pdf │ │ ├── muenz07k-means.pdf │ │ ├── p49-mantere.pdf │ │ ├── thesis.pdf │ │ └── zander2005.pdf │ ├── omlijning.txt │ ├── opmerking_draft_1.txt │ ├── read │ │ ├── HowToTestAnIPS.pdf │ │ └── reffed │ │ │ ├── 10.1.1.132.4051.pdf │ │ │ ├── 30585-30321-1-PB.pdf │ │ │ ├── Yousef_Abuadlla_doktorska_disertacija.pdf │ │ │ ├── d2r2s3_golling.pdf │ │ │ ├── f3158.pdf │ │ │ ├── netflowIPS.pdf │ │ │ └── oakland10-ml.pdf │ ├── results.numbers │ └── tips.txt └── thesis │ ├── bachelorthesis_axel_faes_03_06_2016.pdf │ ├── bachelorthesis_axel_faes_06_06_2016.pdf │ ├── bachelorthesis_axel_faes_07_06_2016.pdf │ ├── bachelorthesis_axel_faes_16_05_2016.pdf │ ├── bachelorthesis_axel_faes_21_05_2016.pdf │ └── bachelorthesis_axel_faes_final.pdf ├── experiments.pdf ├── poster.pdf └── vulgariserend_artikel_axel_faes.pdf /.gitignore: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/.gitignore -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/README.md -------------------------------------------------------------------------------- /bachelorthesis_axel_faes_final.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/bachelorthesis_axel_faes_final.pdf -------------------------------------------------------------------------------- /code/configs/main/bayesian.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/bayesian.json -------------------------------------------------------------------------------- /code/configs/main/config.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/config.json -------------------------------------------------------------------------------- /code/configs/main/config_binary_knn.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/config_binary_knn.json -------------------------------------------------------------------------------- /code/configs/main/config_learning.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/config_learning.json -------------------------------------------------------------------------------- /code/configs/main/country_complete.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/country_complete.json -------------------------------------------------------------------------------- /code/configs/main/db.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/db.json -------------------------------------------------------------------------------- /code/configs/main/demo.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/demo.json -------------------------------------------------------------------------------- /code/configs/main/features.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/features.json -------------------------------------------------------------------------------- /code/configs/main/good.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/good.txt -------------------------------------------------------------------------------- /code/configs/main/knn.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/knn.json -------------------------------------------------------------------------------- /code/configs/main/knn_distance.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/knn_distance.json -------------------------------------------------------------------------------- /code/configs/main/knn_other.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/knn_other.json -------------------------------------------------------------------------------- /code/configs/main/linear_svm.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/linear_svm.json -------------------------------------------------------------------------------- /code/configs/main/log.txt: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /code/configs/main/neural.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/neural.json -------------------------------------------------------------------------------- /code/configs/main/nonlinear-svm.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/nonlinear-svm.json -------------------------------------------------------------------------------- /code/configs/main/one_class_svm.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/one_class_svm.json -------------------------------------------------------------------------------- /code/configs/main/protocols.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/protocols.json -------------------------------------------------------------------------------- /code/configs/main/random.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/random.json -------------------------------------------------------------------------------- /code/configs/main/test.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/test.json -------------------------------------------------------------------------------- /code/configs/main/tree.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/main/tree.json -------------------------------------------------------------------------------- /code/configs/testing.json: -------------------------------------------------------------------------------- 1 | [ 2 | "main/config.json" 3 | ] 4 | -------------------------------------------------------------------------------- /code/configs/testing.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/configs/testing.txt -------------------------------------------------------------------------------- /code/logs/log_country/knn_country.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/log_country/knn_country.txt -------------------------------------------------------------------------------- /code/logs/log_country/lin.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/log_country/lin.txt -------------------------------------------------------------------------------- /code/logs/log_country/neural.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/log_country/neural.txt -------------------------------------------------------------------------------- /code/logs/log_country/oneclass.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/log_country/oneclass.txt -------------------------------------------------------------------------------- /code/logs/log_country/svm.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/log_country/svm.txt -------------------------------------------------------------------------------- /code/logs/log_country/tree.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/log_country/tree.txt -------------------------------------------------------------------------------- /code/logs/logs_flags/bayesian.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_flags/bayesian.txt -------------------------------------------------------------------------------- /code/logs/logs_flags/knn_flags.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_flags/knn_flags.txt -------------------------------------------------------------------------------- /code/logs/logs_flags/linsvm.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_flags/linsvm.txt -------------------------------------------------------------------------------- /code/logs/logs_flags/neural.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_flags/neural.txt -------------------------------------------------------------------------------- /code/logs/logs_flags/oneclass.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_flags/oneclass.txt -------------------------------------------------------------------------------- /code/logs/logs_flags/svm.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_flags/svm.txt -------------------------------------------------------------------------------- /code/logs/logs_flags/tree.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_flags/tree.txt -------------------------------------------------------------------------------- /code/logs/logs_normal/bayes_2runs.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_normal/bayes_2runs.txt -------------------------------------------------------------------------------- /code/logs/logs_normal/knn.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_normal/knn.txt -------------------------------------------------------------------------------- /code/logs/logs_normal/knn_binary_experiment.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_normal/knn_binary_experiment.txt -------------------------------------------------------------------------------- /code/logs/logs_normal/knn_distance.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_normal/knn_distance.txt -------------------------------------------------------------------------------- /code/logs/logs_normal/knn_other.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_normal/knn_other.txt -------------------------------------------------------------------------------- /code/logs/logs_normal/lin.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_normal/lin.txt -------------------------------------------------------------------------------- /code/logs/logs_normal/neural.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_normal/neural.txt -------------------------------------------------------------------------------- /code/logs/logs_normal/oneclass.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_normal/oneclass.txt -------------------------------------------------------------------------------- /code/logs/logs_normal/random.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_normal/random.txt -------------------------------------------------------------------------------- /code/logs/logs_normal/svm.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_normal/svm.txt -------------------------------------------------------------------------------- /code/logs/logs_normal/tree.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_normal/tree.txt -------------------------------------------------------------------------------- /code/logs/logs_old_deprecated/bayes.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_old_deprecated/bayes.txt -------------------------------------------------------------------------------- /code/logs/logs_old_deprecated/knn.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_old_deprecated/knn.txt -------------------------------------------------------------------------------- /code/logs/logs_old_deprecated/knn_uniform.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_old_deprecated/knn_uniform.txt -------------------------------------------------------------------------------- /code/logs/logs_old_deprecated/lin_svm.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_old_deprecated/lin_svm.txt -------------------------------------------------------------------------------- /code/logs/logs_old_deprecated/neural.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_old_deprecated/neural.txt -------------------------------------------------------------------------------- /code/logs/logs_old_deprecated/nonlin_svm.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_old_deprecated/nonlin_svm.txt -------------------------------------------------------------------------------- /code/logs/logs_old_deprecated/oneclass.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_old_deprecated/oneclass.txt -------------------------------------------------------------------------------- /code/logs/logs_old_deprecated/random.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_old_deprecated/random.txt -------------------------------------------------------------------------------- /code/logs/logs_old_deprecated/random2.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_old_deprecated/random2.txt -------------------------------------------------------------------------------- /code/logs/logs_old_deprecated/tcp.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_old_deprecated/tcp.txt -------------------------------------------------------------------------------- /code/logs/logs_old_deprecated/tree.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_old_deprecated/tree.txt -------------------------------------------------------------------------------- /code/logs/logs_tcp_2runs/bayes.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_tcp_2runs/bayes.txt -------------------------------------------------------------------------------- /code/logs/logs_tcp_2runs/knn.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_tcp_2runs/knn.txt -------------------------------------------------------------------------------- /code/logs/logs_tcp_2runs/lin.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_tcp_2runs/lin.txt -------------------------------------------------------------------------------- /code/logs/logs_tcp_2runs/neural.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_tcp_2runs/neural.txt -------------------------------------------------------------------------------- /code/logs/logs_tcp_2runs/oneclass.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_tcp_2runs/oneclass.txt -------------------------------------------------------------------------------- /code/logs/logs_tcp_2runs/svm.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_tcp_2runs/svm.txt -------------------------------------------------------------------------------- /code/logs/logs_tcp_2runs/tree.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/logs/logs_tcp_2runs/tree.txt -------------------------------------------------------------------------------- /code/models/demo/model/model.mdl: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/models/demo/model/model.mdl -------------------------------------------------------------------------------- /code/models/demo/model/model.mdl_01.npy: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/models/demo/model/model.mdl_01.npy -------------------------------------------------------------------------------- /code/models/demo/model/model.mdl_02.npy: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/models/demo/model/model.mdl_02.npy -------------------------------------------------------------------------------- /code/models/demo/model/model.mdl_03.npy: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/models/demo/model/model.mdl_03.npy -------------------------------------------------------------------------------- /code/models/demo/model/model.mdl_04.npy: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/models/demo/model/model.mdl_04.npy -------------------------------------------------------------------------------- /code/models/demo/model/model.mdl_05.npy: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/models/demo/model/model.mdl_05.npy -------------------------------------------------------------------------------- /code/models/demo/model/model.mdl_06.npy: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/models/demo/model/model.mdl_06.npy -------------------------------------------------------------------------------- /code/models/demo/model/model.mdl_07.npy: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/models/demo/model/model.mdl_07.npy -------------------------------------------------------------------------------- /code/models/demo/model/model.mdl_08.npy: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/models/demo/model/model.mdl_08.npy -------------------------------------------------------------------------------- /code/models/demo/model/model.mdl_09.npy: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/models/demo/model/model.mdl_09.npy -------------------------------------------------------------------------------- /code/models/model/.gitfolder: -------------------------------------------------------------------------------- 1 | -------------------------------------------------------------------------------- /code/pip_requirements_unix.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/pip_requirements_unix.txt -------------------------------------------------------------------------------- /code/src/calc.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/calc.py -------------------------------------------------------------------------------- /code/src/calc_stat.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/calc_stat.py -------------------------------------------------------------------------------- /code/src/config.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/config.py -------------------------------------------------------------------------------- /code/src/feature.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/feature.py -------------------------------------------------------------------------------- /code/src/flow.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/flow.py -------------------------------------------------------------------------------- /code/src/load_country.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/load_country.py -------------------------------------------------------------------------------- /code/src/load_sql.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/load_sql.py -------------------------------------------------------------------------------- /code/src/loader.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/loader.py -------------------------------------------------------------------------------- /code/src/logger.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/logger.py -------------------------------------------------------------------------------- /code/src/main.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/main.py -------------------------------------------------------------------------------- /code/src/ml.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/ml.py -------------------------------------------------------------------------------- /code/src/prediction_type.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/prediction_type.py -------------------------------------------------------------------------------- /code/src/predictor.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/predictor.py -------------------------------------------------------------------------------- /code/src/pynfdump_src.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/pynfdump_src.py -------------------------------------------------------------------------------- /code/src/result.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/result.py -------------------------------------------------------------------------------- /code/src/sniffer.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/sniffer.py -------------------------------------------------------------------------------- /code/src/testing.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/testing.py -------------------------------------------------------------------------------- /code/src/train.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/train.py -------------------------------------------------------------------------------- /code/src/visualise.py: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/code/src/visualise.py -------------------------------------------------------------------------------- /documents/demo.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/demo.pdf -------------------------------------------------------------------------------- /documents/latex-article-nl/project.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-article-nl/project.tex -------------------------------------------------------------------------------- /documents/latex-article-nl/vulgariserend_artikel_axel_faes.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-article-nl/vulgariserend_artikel_axel_faes.pdf -------------------------------------------------------------------------------- /documents/latex-experiments/BachelorThesis.cls: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/BachelorThesis.cls -------------------------------------------------------------------------------- /documents/latex-experiments/Chapters/Baseline.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/Chapters/Baseline.tex -------------------------------------------------------------------------------- /documents/latex-experiments/Chapters/Bayes.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/Chapters/Bayes.tex -------------------------------------------------------------------------------- /documents/latex-experiments/Chapters/ChapterTemplate.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/Chapters/ChapterTemplate.tex -------------------------------------------------------------------------------- /documents/latex-experiments/Chapters/Introduction.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/Chapters/Introduction.tex -------------------------------------------------------------------------------- /documents/latex-experiments/Chapters/KNN.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/Chapters/KNN.tex -------------------------------------------------------------------------------- /documents/latex-experiments/Chapters/LinSvm.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/Chapters/LinSvm.tex -------------------------------------------------------------------------------- /documents/latex-experiments/Chapters/NeuralNet.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/Chapters/NeuralNet.tex -------------------------------------------------------------------------------- /documents/latex-experiments/Chapters/OneClass.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/Chapters/OneClass.tex -------------------------------------------------------------------------------- /documents/latex-experiments/Chapters/Svm.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/Chapters/Svm.tex -------------------------------------------------------------------------------- /documents/latex-experiments/Chapters/Tree.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/Chapters/Tree.tex -------------------------------------------------------------------------------- /documents/latex-experiments/LOGO.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/LOGO.jpg -------------------------------------------------------------------------------- /documents/latex-experiments/main_correct_template.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/main_correct_template.pdf -------------------------------------------------------------------------------- /documents/latex-experiments/main_correct_template.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-experiments/main_correct_template.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Appendices/AppendixTemplate.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Appendices/AppendixTemplate.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Appendices/Config.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Appendices/Config.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Appendices/Experiments.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Appendices/Experiments.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Appendices/Framework.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Appendices/Framework.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Appendices/Meetings.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Appendices/Meetings.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Appendices/Review.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Appendices/Review.tex -------------------------------------------------------------------------------- /documents/latex-thesis/BachelorThesis.cls: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/BachelorThesis.cls -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/Algorithms.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/Algorithms.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/Attacks.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/Attacks.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/ChapterTemplate.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/ChapterTemplate.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/Conclusion.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/Conclusion.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/Evaluation.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/Evaluation.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/Flow.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/Flow.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/FutureWork.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/FutureWork.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/IDS.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/IDS.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/Implementation.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/Implementation.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/Introduction.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/Introduction.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/ML-IDS.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/ML-IDS.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/ML.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/ML.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/Samenvatting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/Samenvatting.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/Techniques.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/Techniques.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Chapters/Validation.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Chapters/Validation.tex -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/AI2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/AI2.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/Anomaly-based-Intrusion-Detection-System.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/Anomaly-based-Intrusion-Detection-System.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/Apriori.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/Apriori.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/DecisionTreeClassifier.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/DecisionTreeClassifier.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/DecisionTreeClassifier_700000.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/DecisionTreeClassifier_700000.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/Gaussian_Naive_Bayes.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/Gaussian_Naive_Bayes.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/IDS_IPS.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/IDS_IPS.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/KNN_only_botnet.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/KNN_only_botnet.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/KNeighborsClassifier_Distance.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/KNeighborsClassifier_Distance.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/KNeighborsClassifier_Uniform.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/KNeighborsClassifier_Uniform.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/Linear_Support_Vector_Machine.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/Linear_Support_Vector_Machine.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/NeuralNetwork.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/NeuralNetwork.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/Plot_DecisionTreeClassifier.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/Plot_DecisionTreeClassifier.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/Plot_RandomClassifier.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/Plot_RandomClassifier.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/Signature-based-Intrusion-Detection-System.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/Signature-based-Intrusion-Detection-System.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/Support_Vector_Machine.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/Support_Vector_Machine.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/anomaly.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/anomaly.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/bagging.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/bagging.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/bias_variance_chart.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/bias_variance_chart.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/bias_variance_chart.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/bias_variance_chart.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/biasvariance.bmp: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/biasvariance.bmp -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/biasvariance.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/biasvariance.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/binclass.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/binclass.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/botnet.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/botnet.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/chebyshevDistance.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/chebyshevDistance.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/classifierNoise.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/classifierNoise.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/ctu13-1.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/ctu13-1.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/ctu13-2.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/ctu13-2.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/ctu13-3.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/ctu13-3.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/ddos.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/ddos.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/decisiontreeExample.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/decisiontreeExample.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/euclideanDistance.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/euclideanDistance.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/evaluation_learningcurve_knn.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/evaluation_learningcurve_knn.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/featureScale.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/featureScale.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/featureScaleNot.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/featureScaleNot.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/gradient.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/gradient.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/hammingDistance.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/hammingDistance.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/highvariance.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/highvariance.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/idsdiagram.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/idsdiagram.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/ip-api.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/ip-api.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/kmeansExample.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/kmeansExample.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/knn.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/knn.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/knnExample.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/knnExample.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/knnExample2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/knnExample2.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/main_the_middle.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/main_the_middle.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/manhattanDistance.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/manhattanDistance.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/minkowskiDistance.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/minkowskiDistance.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/ml_algorithms.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/ml_algorithms.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/multiclass.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/multiclass.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/netflow.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/netflow.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/neuralnet.jpeg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/neuralnet.jpeg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/neuralnetmulti.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/neuralnetmulti.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/normaldist.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/normaldist.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/oneclasssvmExample.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/oneclasssvmExample.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/overfit.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/overfit.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/precisionrecall.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/precisionrecall.png -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/snort.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/snort.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/Figures/svm.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/Figures/svm.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/LOGO.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/LOGO.jpg -------------------------------------------------------------------------------- /documents/latex-thesis/MastersDoctoralThesis.cls: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/MastersDoctoralThesis.cls -------------------------------------------------------------------------------- /documents/latex-thesis/main.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/main.pdf -------------------------------------------------------------------------------- /documents/latex-thesis/main.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/main.tex -------------------------------------------------------------------------------- /documents/latex-thesis/main_correct_template.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/main_correct_template.pdf -------------------------------------------------------------------------------- /documents/latex-thesis/main_correct_template.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/main_correct_template.tex -------------------------------------------------------------------------------- /documents/latex-thesis/references.bib: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/latex-thesis/references.bib -------------------------------------------------------------------------------- /documents/meetings/2016-02-09/2016-02-09-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-02-09/2016-02-09-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-02-09/project-blx (1).bib: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-02-09/project-blx (1).bib -------------------------------------------------------------------------------- /documents/meetings/2016-02-09/project.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-02-09/project.tex -------------------------------------------------------------------------------- /documents/meetings/2016-02-12/2016-02-12-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-02-12/2016-02-12-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-02-12/project.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-02-12/project.tex -------------------------------------------------------------------------------- /documents/meetings/2016-02-19/2016-02-19-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-02-19/2016-02-19-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-02-19/2016-02-19-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-02-19/2016-02-19-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-02-26/2016-02-26-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-02-26/2016-02-26-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-02-26/2016-02-26-meeting.synctex (1).gz: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-02-26/2016-02-26-meeting.synctex (1).gz -------------------------------------------------------------------------------- /documents/meetings/2016-02-26/2016-02-26-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-02-26/2016-02-26-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-03-04/2016-03-04-meeting (1).tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-04/2016-03-04-meeting (1).tex -------------------------------------------------------------------------------- /documents/meetings/2016-03-04/2016-03-04-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-04/2016-03-04-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-03-04/2016-03-04-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-04/2016-03-04-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-03-08-presentatie.key: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-08-presentatie.key -------------------------------------------------------------------------------- /documents/meetings/2016-03-08-presentatie/2016-03-08-presentatie.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-08-presentatie/2016-03-08-presentatie.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-03-08-presentatie/2016-03-08-presentatie.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-08-presentatie/2016-03-08-presentatie.tex -------------------------------------------------------------------------------- /documents/meetings/2016-03-11/2016-03-11-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-11/2016-03-11-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-03-11/2016-03-11-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-11/2016-03-11-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-03-18/2016-03-18-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-18/2016-03-18-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-03-18/2016-03-18-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-18/2016-03-18-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-03-24/2016-03-24-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-24/2016-03-24-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-03-24/2016-03-24-meeting.run (1).xml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-24/2016-03-24-meeting.run (1).xml -------------------------------------------------------------------------------- /documents/meetings/2016-03-24/2016-03-24-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-03-24/2016-03-24-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-04-01/2016-04-01-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-01/2016-04-01-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-04-01/2016-04-01-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-01/2016-04-01-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-04-06-Cegeka/2016-04-06-Cegeka-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-06-Cegeka/2016-04-06-Cegeka-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-04-06-Cegeka/2016-04-06-Cegeka-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-06-Cegeka/2016-04-06-Cegeka-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-04-12/2016-04-12-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-12/2016-04-12-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-04-12/2016-04-12-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-12/2016-04-12-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-04-18/2016-04-18-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-18/2016-04-18-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-04-18/2016-04-18-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-18/2016-04-18-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-04-22/2016-04-18-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-22/2016-04-18-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-04-22/2016-04-22-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-22/2016-04-22-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-04-22/2016-04-22-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-22/2016-04-22-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-04-29/2016-04-29-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-29/2016-04-29-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-04-29/2016-04-29-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-04-29/2016-04-29-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/2016-05-04/2016-05-04-meeting.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-05-04/2016-05-04-meeting.pdf -------------------------------------------------------------------------------- /documents/meetings/2016-05-04/2016-05-04-meeting.tex: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/2016-05-04/2016-05-04-meeting.tex -------------------------------------------------------------------------------- /documents/meetings/Presentatie-Cegeka.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/meetings/Presentatie-Cegeka.pdf -------------------------------------------------------------------------------- /documents/poster.pages: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/poster.pages -------------------------------------------------------------------------------- /documents/poster_sources.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/poster_sources.txt -------------------------------------------------------------------------------- /documents/reference-material/AI2_Paper.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/AI2_Paper.pdf -------------------------------------------------------------------------------- /documents/reference-material/Practical_Malware_Analysis.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/Practical_Malware_Analysis.pdf -------------------------------------------------------------------------------- /documents/reference-material/leidraad_bachelorproef_2015-2016.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/leidraad_bachelorproef_2015-2016.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/10.1.1.402.6779.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/10.1.1.402.6779.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/1210ijcsit13.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/1210ijcsit13.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/1820-02141400035A.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/1820-02141400035A.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/23d75be621a6acec5fc369295ee77b3fbf49.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/23d75be621a6acec5fc369295ee77b3fbf49.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/35-o-jayveer_singh-A_Survey_on_Machine.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/35-o-jayveer_singh-A_Survey_on_Machine.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/A Review of Intrusion Detection System.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/A Review of Intrusion Detection System.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/FULLTEXT01.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/FULLTEXT01.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/NMRG-2.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/NMRG-2.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/a23-beaver.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/a23-beaver.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/muenz07k-means.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/muenz07k-means.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/p49-mantere.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/p49-mantere.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/thesis.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/thesis.pdf -------------------------------------------------------------------------------- /documents/reference-material/notread/zander2005.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/notread/zander2005.pdf -------------------------------------------------------------------------------- /documents/reference-material/omlijning.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/omlijning.txt -------------------------------------------------------------------------------- /documents/reference-material/opmerking_draft_1.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/opmerking_draft_1.txt -------------------------------------------------------------------------------- /documents/reference-material/read/HowToTestAnIPS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/read/HowToTestAnIPS.pdf -------------------------------------------------------------------------------- /documents/reference-material/read/reffed/10.1.1.132.4051.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/read/reffed/10.1.1.132.4051.pdf -------------------------------------------------------------------------------- /documents/reference-material/read/reffed/30585-30321-1-PB.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/read/reffed/30585-30321-1-PB.pdf -------------------------------------------------------------------------------- /documents/reference-material/read/reffed/Yousef_Abuadlla_doktorska_disertacija.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/read/reffed/Yousef_Abuadlla_doktorska_disertacija.pdf -------------------------------------------------------------------------------- /documents/reference-material/read/reffed/d2r2s3_golling.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/read/reffed/d2r2s3_golling.pdf -------------------------------------------------------------------------------- /documents/reference-material/read/reffed/f3158.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/read/reffed/f3158.pdf -------------------------------------------------------------------------------- /documents/reference-material/read/reffed/netflowIPS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/read/reffed/netflowIPS.pdf -------------------------------------------------------------------------------- /documents/reference-material/read/reffed/oakland10-ml.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/read/reffed/oakland10-ml.pdf -------------------------------------------------------------------------------- /documents/reference-material/results.numbers: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/results.numbers -------------------------------------------------------------------------------- /documents/reference-material/tips.txt: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/reference-material/tips.txt -------------------------------------------------------------------------------- /documents/thesis/bachelorthesis_axel_faes_03_06_2016.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/thesis/bachelorthesis_axel_faes_03_06_2016.pdf -------------------------------------------------------------------------------- /documents/thesis/bachelorthesis_axel_faes_06_06_2016.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/thesis/bachelorthesis_axel_faes_06_06_2016.pdf -------------------------------------------------------------------------------- /documents/thesis/bachelorthesis_axel_faes_07_06_2016.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/thesis/bachelorthesis_axel_faes_07_06_2016.pdf -------------------------------------------------------------------------------- /documents/thesis/bachelorthesis_axel_faes_16_05_2016.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/thesis/bachelorthesis_axel_faes_16_05_2016.pdf -------------------------------------------------------------------------------- /documents/thesis/bachelorthesis_axel_faes_21_05_2016.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/thesis/bachelorthesis_axel_faes_21_05_2016.pdf -------------------------------------------------------------------------------- /documents/thesis/bachelorthesis_axel_faes_final.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/documents/thesis/bachelorthesis_axel_faes_final.pdf -------------------------------------------------------------------------------- /experiments.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/experiments.pdf -------------------------------------------------------------------------------- /poster.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/poster.pdf -------------------------------------------------------------------------------- /vulgariserend_artikel_axel_faes.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/TheAxeC/machine-learning-techniques-for-flow-based-network-intrusion-detection-systems/HEAD/vulgariserend_artikel_axel_faes.pdf --------------------------------------------------------------------------------