vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-95.02%)
WeakforcedAnti-Abuse for servers at authentication time
Stars: ✭ 84 (-80.09%)
MaltrailMalicious traffic detection system
Stars: ✭ 4,296 (+918.01%)
DeepLearning-IDSNetwork Intrusion Detection System using Deep Learning Techniques
Stars: ✭ 76 (-81.99%)
SiacSIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (-76.3%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (-92.65%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (-51.42%)
kdd99-scikitSolutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
Stars: ✭ 50 (-88.15%)
Osql ExperimentalA community-oriented fork of osquery with support for cmake, public CI testing, and regular releases
Stars: ✭ 62 (-85.31%)
FlightsimA utility to generate malicious network traffic and evaluate controls
Stars: ✭ 525 (+24.41%)
NetLearnerDeep Learning Tool for Off-line Network Intrusion Detection System
Stars: ✭ 24 (-94.31%)
OsquerySQL powered operating system instrumentation, monitoring, and analytics.
Stars: ✭ 18,475 (+4277.96%)
Wazuh DockerWazuh - Docker containers
Stars: ✭ 213 (-49.53%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+600.47%)
PysadStreaming Anomaly Detection Framework in Python (Outlier Detection for Streaming Data)
Stars: ✭ 87 (-79.38%)
Libellux-Up-and-RunningLibellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-95.5%)
MStreamAnomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 68 (-83.89%)
UNSW NB15Feature coded UNSW_NB15 intrusion detection data.
Stars: ✭ 50 (-88.15%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+647.39%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-96.92%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-97.87%)
MidasAnomaly Detection on Dynamic (time-evolving) Graphs in Real-time and Streaming manner. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 591 (+40.05%)
Snort RulesAn UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (-68.01%)
Agentsmith HidsBy Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.
Stars: ✭ 513 (+21.56%)
Ossec HidsOSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Stars: ✭ 3,580 (+748.34%)
NfrA lightweight tool to score network traffic and flag anomalies
Stars: ✭ 104 (-75.36%)
LID-DSLID-DS is an intrusion detection data simulation framework.
Stars: ✭ 32 (-92.42%)
Psadpsad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (-29.38%)
BlackbookBlackbook of malware domains
Stars: ✭ 89 (-78.91%)
ExposeAn Intrusion Detection System library loosely based on PHP IDS
Stars: ✭ 255 (-39.57%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (-50.47%)
pyHIDSA HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Stars: ✭ 31 (-92.65%)
suspicious loginDetect and warn about suspicious IPs logging into Nextcloud
Stars: ✭ 45 (-89.34%)
feverfast, extensible, versatile event router for Suricata's EVE-JSON format
Stars: ✭ 47 (-88.86%)
NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-89.34%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+195.73%)
BriaridsAn All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.
Stars: ✭ 187 (-55.69%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-95.02%)
Gru Svm[ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection
Stars: ✭ 76 (-81.99%)
hyperdomethe safest place to reach out
Stars: ✭ 26 (-93.84%)
wazuh-packagesWazuh - Tools for packages creation
Stars: ✭ 54 (-87.2%)
Tr1pdtamper resistant audit log
Stars: ✭ 13 (-96.92%)
sandfly-setupSandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (-89.34%)
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+72.04%)
waycupA minimal tool that hides your online assets from online security scanners, researchers and hackers.
Stars: ✭ 100 (-76.3%)
Intrusion DetectionWhenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.
Stars: ✭ 24 (-94.31%)
SecumlMachine Learning for Computer Security
Stars: ✭ 221 (-47.63%)
Yulong Hids一款由 YSRC 开源的主机入侵检测系统
Stars: ✭ 1,938 (+359.24%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+1482.23%)