NIDS-Intrusion-DetectionSimple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Stars: ✭ 45 (-10%)
kdd99-scikitSolutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
Stars: ✭ 50 (+0%)
ML-ATICAbnormal Traffic Identification Classifier based on Machine Learning. My code for undergraduate graduation design.
Stars: ✭ 24 (-52%)
DeepLearning-IDSNetwork Intrusion Detection System using Deep Learning Techniques
Stars: ✭ 76 (+52%)
BURN[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Stars: ✭ 13 (-74%)
sandfly-setupSandfly Security Agentless Compromise and Intrusion Detection System For Linux
Stars: ✭ 45 (-10%)
NetLearnerDeep Learning Tool for Off-line Network Intrusion Detection System
Stars: ✭ 24 (-52%)
picosnitchMonitor network traffic per executable using BPF
Stars: ✭ 422 (+744%)
feverfast, extensible, versatile event router for Suricata's EVE-JSON format
Stars: ✭ 47 (-6%)
Intrusion DetectionWhenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.
Stars: ✭ 24 (-52%)
LID-DSLID-DS is an intrusion detection data simulation framework.
Stars: ✭ 32 (-36%)
SecumlMachine Learning for Computer Security
Stars: ✭ 221 (+342%)
Pi.alertWIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Stars: ✭ 209 (+318%)
Py Idstoolsidstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Stars: ✭ 205 (+310%)
BriaridsAn All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.
Stars: ✭ 187 (+274%)
WazuhWazuh - The Open Source Security Platform
Stars: ✭ 3,154 (+6208%)
Yulong Hids一款由 YSRC 开源的主机入侵检测系统
Stars: ✭ 1,938 (+3776%)
Snort RulesAn UNOFFICIAL Git Repository of Snort Rules(IDS rules) Releases.
Stars: ✭ 135 (+170%)
NfrA lightweight tool to score network traffic and flag anomalies
Stars: ✭ 104 (+108%)
SiacSIAC is an enterprise SIEM built on open-source technology.
Stars: ✭ 100 (+100%)
BlackbookBlackbook of malware domains
Stars: ✭ 89 (+78%)
PysadStreaming Anomaly Detection Framework in Python (Outlier Detection for Streaming Data)
Stars: ✭ 87 (+74%)
WeakforcedAnti-Abuse for servers at authentication time
Stars: ✭ 84 (+68%)
TelerReal-time HTTP Intrusion Detection
Stars: ✭ 1,248 (+2396%)
Gru Svm[ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection
Stars: ✭ 76 (+52%)
Osql ExperimentalA community-oriented fork of osquery with support for cmake, public CI testing, and regular releases
Stars: ✭ 62 (+24%)
Tr1pdtamper resistant audit log
Stars: ✭ 13 (-74%)
Wazuh ChefWazuh - Chef cookbooks
Stars: ✭ 9 (-82%)
AcraDatabase security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Stars: ✭ 726 (+1352%)
Fail2banDaemon to ban hosts that cause multiple authentication errors
Stars: ✭ 6,677 (+13254%)
MidasAnomaly Detection on Dynamic (time-evolving) Graphs in Real-time and Streaming manner. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 591 (+1082%)
FlightsimA utility to generate malicious network traffic and evaluate controls
Stars: ✭ 525 (+950%)
Agentsmith HidsBy Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.
Stars: ✭ 513 (+926%)
MaltrailMalicious traffic detection system
Stars: ✭ 4,296 (+8492%)
Ossec HidsOSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Stars: ✭ 3,580 (+7060%)
OsquerySQL powered operating system instrumentation, monitoring, and analytics.
Stars: ✭ 18,475 (+36850%)
Psadpsad: Intrusion Detection and Log Analysis with iptables
Stars: ✭ 298 (+496%)
Security OnionSecurity Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Stars: ✭ 2,956 (+5812%)
ExposeAn Intrusion Detection System library loosely based on PHP IDS
Stars: ✭ 255 (+410%)
bsmtraceBSM based intrusion detection system
Stars: ✭ 31 (-38%)
pyHIDSA HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Stars: ✭ 31 (-38%)
Libellux-Up-and-RunningLibellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Stars: ✭ 19 (-62%)
suspicious loginDetect and warn about suspicious IPs logging into Nextcloud
Stars: ✭ 45 (-10%)
vagrant-idsAn Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Stars: ✭ 21 (-58%)
MStreamAnomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Stars: ✭ 68 (+36%)
TheBriarPatchAn extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Stars: ✭ 21 (-58%)
NetcapA framework for secure and scalable network traffic analysis - https://netcap.io
Stars: ✭ 1,519 (+2938%)