top of page
MALICIOUS TRAFFIC DETECTION
![network-traffic.jpeg](https://static.wixstatic.com/media/361e70_68c39ebb901848db824f7573ca999d1c~mv2.jpeg/v1/fill/w_126,h_84,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/361e70_68c39ebb901848db824f7573ca999d1c~mv2.jpeg)
INPUT
​ ​
- choice of result type ​
- Malicious file (malicious_flows)​
- Benign File (sample_benign_flows)
![Picture2.jpg](https://static.wixstatic.com/media/361e70_6f9534fc09e147fb8ac0daa2178a646a~mv2.jpg/v1/crop/x_0,y_0,w_473,h_266,q_80,blur_2,enc_auto/361e70_6f9534fc09e147fb8ac0daa2178a646a~mv2.jpg)
OUTPUT
​
- Plot of Accuracy ​
- Plot of loss
![Picture1.jpg](https://static.wixstatic.com/media/361e70_c9c7c0a419ca46c5bddbb22757532aee~mv2.jpg/v1/crop/x_0,y_0,w_420,h_266,q_80,blur_2,enc_auto/361e70_c9c7c0a419ca46c5bddbb22757532aee~mv2.jpg)
bottom of page
MALICIOUS TRAFFIC DETECTION
​ ​
- choice of result type ​
- Malicious file (malicious_flows)​
- Benign File (sample_benign_flows)
​
- Plot of Accuracy ​
- Plot of loss