MaltrailMalicious traffic detection system
Stars: ✭ 4,296 (+737.43%)
Ossec HidsOSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Stars: ✭ 3,580 (+597.86%)
OsquerySQL powered operating system instrumentation, monitoring, and analytics.
Stars: ✭ 18,475 (+3501.36%)
Psadpsad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (-41.91%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+476.22%)
ExposeAn Intrusion Detection System library loosely based on PHP IDS
Stars: ✭ 255 (-50.29%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (-93.96%)
pyHIDSA HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Stars: ✭ 31 (-93.96%)
Libellux-Up-and-RunningLibellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-96.3%)
suspicious loginDetect and warn about suspicious IPs logging into Nextcloud
Stars: ✭ 45 (-91.23%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-95.91%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-91.23%)
MStreamAnomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 68 (-86.74%)
kdd99-scikitSolutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
Stars: ✭ 50 (-90.25%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-95.91%)
UNSW NB15Feature coded UNSW_NB15 intrusion detection data.
Stars: ✭ 50 (-90.25%)
DeepLearning-IDSNetwork Intrusion Detection System using Deep Learning Techniques
Stars: ✭ 76 (-85.19%)
wazuh-packagesWazuh - Tools for packages creation
Stars: ✭ 54 (-89.47%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-97.47%)
sandfly-setupSandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (-91.23%)
NetLearnerDeep Learning Tool for Off-line Network Intrusion Detection System
Stars: ✭ 24 (-95.32%)
picosnitchMonitor network traffic per executable using BPF
Stars: ✭ 422 (-17.74%)
feverfast, extensible, versatile event router for Suricata's EVE-JSON format
Stars: ✭ 47 (-90.84%)
Intrusion DetectionWhenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.
Stars: ✭ 24 (-95.32%)
LID-DSLID-DS is an intrusion detection data simulation framework.
Stars: ✭ 32 (-93.76%)
SecumlMachine Learning for Computer Security
Stars: ✭ 221 (-56.92%)
Wazuh DockerWazuh - Docker containers
Stars: ✭ 213 (-58.48%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (-59.26%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (-60.04%)
BriaridsAn All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.
Stars: ✭ 187 (-63.55%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+514.81%)
Yulong Hids一款由 YSRC 开源的主机入侵检测系统
Stars: ✭ 1,938 (+277.78%)
Snort RulesAn UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (-73.68%)
NfrA lightweight tool to score network traffic and flag anomalies
Stars: ✭ 104 (-79.73%)
SiacSIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (-80.51%)
BlackbookBlackbook of malware domains
Stars: ✭ 89 (-82.65%)
PysadStreaming Anomaly Detection Framework in Python (Outlier Detection for Streaming Data)
Stars: ✭ 87 (-83.04%)
WeakforcedAnti-Abuse for servers at authentication time
Stars: ✭ 84 (-83.63%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+143.27%)
Gru Svm[ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection
Stars: ✭ 76 (-85.19%)
Osql ExperimentalA community-oriented fork of osquery with support for cmake, public CI testing, and regular releases
Stars: ✭ 62 (-87.91%)
Tr1pdtamper resistant audit log
Stars: ✭ 13 (-97.47%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-98.25%)
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+41.52%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+1201.56%)
MidasAnomaly Detection on Dynamic (time-evolving) Graphs in Real-time and Streaming manner. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 591 (+15.2%)
FlightsimA utility to generate malicious network traffic and evaluate controls
Stars: ✭ 525 (+2.34%)