All Projects → enygma → Expose

enygma / Expose

Licence: mit
An Intrusion Detection System library loosely based on PHP IDS

Projects that are alternatives of or similar to Expose

fever
fast, extensible, versatile event router for Suricata's EVE-JSON format
Stars: ✭ 47 (-81.57%)
Mutual labels:  intrusion-detection
UNSW NB15
Feature coded UNSW_NB15 intrusion detection data.
Stars: ✭ 50 (-80.39%)
Mutual labels:  intrusion-detection
vagrant-ids
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-91.76%)
Mutual labels:  intrusion-detection
NetLearner
Deep Learning Tool for Off-line Network Intrusion Detection System
Stars: ✭ 24 (-90.59%)
Mutual labels:  intrusion-detection
DeepLearning-IDS
Network Intrusion Detection System using Deep Learning Techniques
Stars: ✭ 76 (-70.2%)
Mutual labels:  intrusion-detection
kdd99-scikit
Solutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
Stars: ✭ 50 (-80.39%)
Mutual labels:  intrusion-detection
LID-DS
LID-DS is an intrusion detection data simulation framework.
Stars: ✭ 32 (-87.45%)
Mutual labels:  intrusion-detection
pyHIDS
A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Stars: ✭ 31 (-87.84%)
Mutual labels:  intrusion-detection
wazuh-ansible
Wazuh - Ansible playbook
Stars: ✭ 166 (-34.9%)
Mutual labels:  intrusion-detection
NIDS-Intrusion-Detection
Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-82.35%)
Mutual labels:  intrusion-detection
sandfly-setup
Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (-82.35%)
Mutual labels:  intrusion-detection
wazuh-packages
Wazuh - Tools for packages creation
Stars: ✭ 54 (-78.82%)
Mutual labels:  intrusion-detection
wazuh-puppet
Wazuh - Puppet module
Stars: ✭ 25 (-90.2%)
Mutual labels:  intrusion-detection
picosnitch
Monitor network traffic per executable using BPF
Stars: ✭ 422 (+65.49%)
Mutual labels:  intrusion-detection
suspicious login
Detect and warn about suspicious IPs logging into Nextcloud
Stars: ✭ 45 (-82.35%)
Mutual labels:  intrusion-detection
Intrusion Detection
Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.
Stars: ✭ 24 (-90.59%)
Mutual labels:  intrusion-detection
TheBriarPatch
An extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-91.76%)
Mutual labels:  intrusion-detection
bsmtrace
BSM based intrusion detection system
Stars: ✭ 31 (-87.84%)
Mutual labels:  intrusion-detection
Libellux-Up-and-Running
Libellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-92.55%)
Mutual labels:  intrusion-detection
MStream
Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 68 (-73.33%)
Mutual labels:  intrusion-detection

Expose: an IDS for PHP

Build Status Insight Rating

Expose is an Intrusion Detection System for PHP loosely based on the PHPIDS project (and using its ruleset for detecting potential threats).

ALL CREDIT for the rule set for Expose goes to the PHPIDS project. Expose literally uses the same JSON configuration for its execution. I am not claiming any kind of ownership or authorship of these rules. Please see the PHPIDS github README for names of those who have contributed.

NOTE: An IDS system should not be relied upon for sole protection in your environment! It should only be used in the first level of threat identification. Please read up on "Defense in Depth" for more information on a layered security approach.

Quick Install

  1. Install Composer:

    curl -s https://getcomposer.org/installer | php
    
  2. Require Expose as a dependency using Composer:

    php composer.phar require enygma/expose
    
  3. Install Expose:

    php composer.phar install
    

Example Usage

<?php
require 'vendor/autoload.php';

$data = array(
    'POST' => array(
        'test' => 'foo',
        'bar' => array(
            'baz' => 'quux',
            'testing' => '<script>test</script>'
        )
    )
);

$filters = new \Expose\FilterCollection();
$filters->load();

//instantiate a PSR-3 compatible logger
$logger = new \Expose\Log\Mongo();

$manager = new \Expose\Manager($filters, $logger);
$manager->run($data);

echo 'impact: '.$manager->getImpact()."\n"; // should return 8

// get all matching filter reports
$reports = $manager->getReports();
print_r($reports);

// export out the report in the given format ("text" is default)
echo $manager->export();
echo "\n\n";

Full Documentation

Full (current) documentation for Expose can be found here: ReadTheDocs for Expose

If you're curious as to the importance of application-level intrusion detection, check out this article on the OWASP site.

Feel free to contact me with questions or how you can help the project!

@author Chris Cornutt [email protected]

Bitdeli Badge

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].