Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for intrusion detection
intrusion-detection
x
123 search results found
Osquery
⭐
20,877
SQL powered operating system instrumentation, monitoring, and analytics.
Fail2ban
⭐
9,695
Daemon to ban hosts that cause multiple authentication errors
Maltrail
⭐
5,572
Malicious traffic detection system
Ossec Hids
⭐
4,145
OSSEC is an Open Source Host-based Intrusion Detection System that performs log analysis, file integrity checking, policy monitoring, rootkit detection, real-time alerting and active response.
Teler
⭐
2,577
Real-time HTTP Intrusion Detection
Yulong Hids Archived
⭐
2,141
[archived] 一款实验性质的主机入侵检测系统
Pi.alert
⭐
1,729
WIFI / LAN intruder detector. Check the devices connected and alert you with unknown devices. It also warns of the disconnection of "always connected" devices
Ipban
⭐
1,411
Since 2011, IPBan is the worlds most trusted, free security software to block hackers and botnets. With both Windows and Linux support, IPBan has your dedicated or cloud server protected. Upgrade to IPBan Pro today and get a discount. Learn more at ↓
Acra
⭐
1,241
Database security suite. Database proxy with field-level encryption, search through encrypted data, SQL injections prevention, intrusion detection, honeypots. Supports client-side and proxy-side ("transparent") encryption. SQL, NoSQL.
Digital Forensics Guide
⭐
1,232
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Flightsim
⭐
1,097
A utility to safely generate malicious network traffic patterns and evaluate controls.
Open Source Security Guide
⭐
795
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
Midas
⭐
750
Anomaly Detection on Dynamic (time-evolving) Graphs in Real-time and Streaming manner. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Agentsmith Hids
⭐
581
By Kprobe technology Open Source Host-based Intrusion Detection System(HIDS), from E_Bwill.
Wazuh Docker
⭐
532
Wazuh - Docker containers
Picosnitch
⭐
529
Monitor Network Traffic Per Executable, Beautifully Visualized
Wazuh Dashboard Plugins
⭐
376
Plugins for Wazuh Dashboard
Psad
⭐
262
psad: Intrusion Detection and Log Analysis with iptables
Py Idstools
⭐
261
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
Secuml
⭐
252
Machine Learning for Computer Security
Expose
⭐
249
An Intrusion Detection System library loosely based on PHP IDS
Intrusion Detection System Using Machine Learning
⭐
248
Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGBoost, stacking, k-means, Bayesian optimization..)
Osquery Extensions
⭐
241
osquery extensions by Trail of Bits
Wazuh Ansible
⭐
227
Wazuh - Ansible playbook
Briarids
⭐
206
An All-In-One home intrusion detection system (IDS) solution for the Raspberry PI.
Pysad
⭐
200
Streaming Anomaly Detection Framework in Python (Outlier Detection for Streaming Data)
Network Intrusion Detection
⭐
195
Network Intrusion Detection KDDCup '99', NSL-KDD and UNSW-NB15
Blackbook
⭐
179
Blackbook of malware domains
Wazuh Documentation
⭐
151
Wazuh - Project documentation
Intrusion And Anomaly Detection With Machine Learning
⭐
129
Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.
Nfr
⭐
120
A lightweight tool to score network traffic and flag anomalies
Weakforced
⭐
114
Anti-Abuse for servers at authentication time
Sandfly Entropyscan
⭐
108
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
Mstream
⭐
98
Anomaly Detection on Time-Evolving Streams in Real-time. Detecting intrusions (DoS and DDoS attacks), frauds, fake rating anomalies.
Cyber Security
⭐
89
Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities
Siac
⭐
87
SIAC is an enterprise SIEM built on open-source technology.
Suspicious_login
⭐
73
Detect and warn about suspicious IPs logging into Nextcloud
Gru Svm
⭐
70
[ICMLC 2018] A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection
Wazuh Packages
⭐
69
Wazuh - Tools for packages creation
Deeplearning Ids
⭐
68
Network Intrusion Detection System using Deep Learning Techniques
Anograph
⭐
68
Sketch-Based Anomaly Detection in Streaming Graphs
Object Tracking Line Crossing Area Intrusion
⭐
63
Deep learning based object tracking with line crossing and area intrusion detection
Intrusion Detection System Using Deep Learning
⭐
60
VGG-19 deep learning model trained using ISCX 2012 IDS Dataset
Sandfly Setup
⭐
57
Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
Wazuh Api
⭐
56
Wazuh - RESTful API
Fwsnort
⭐
54
Application Layer IDS/IPS with iptables
Intrusion Detection System Using Cnn And Transfer Learning
⭐
54
Code for intrusion detection system (IDS) development using CNN models and transfer learning
Logdata Anomaly Miner
⭐
53
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
Libellux Up And Running
⭐
53
Libellux: Up & Running provides documentation on how-to install open-source software from source. The focus is Zero Trust Network to enhance the security for existing applications or install tools to detect and prevent threats.
Zeek_anomaly_detector
⭐
51
A completely automated anomaly detector Zeek network flows files (conn.log).
Fever
⭐
48
fast, extensible, versatile event router for Suricata's EVE-JSON format
Pyhids
⭐
47
A HIDS (host-based intrusion detection system) for verifying the integrity of a system.
Wazuh Splunk
⭐
45
Wazuh - Splunk App
Id2t
⭐
42
Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.
Kdd99 Scikit
⭐
41
Solutions to kdd99 dataset with Decision tree and Neural network by scikit-learn
Deeplearningmaliciousurls
⭐
40
Machine Learning Models to Detect and Classify Malicious URLs
Wazuh Puppet
⭐
38
Wazuh - Puppet module
Awesome Ai For Cybersecurity
⭐
32
Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), application (WAF or database firewalls), user (UBA), process behavior (anti-fraud).
Pofr
⭐
31
Penguin OS Forensic (or Flight) Recorder
Bsmtrace
⭐
31
BSM based intrusion detection system
Lid Ds
⭐
29
LID-DS is an intrusion detection data simulation framework.
Malicious Urls Detection With Autoencoder Neural Networks
⭐
29
Detecting malicious URLs using an autoencoder neural network
Wolfsentry
⭐
29
wolfSSL Intrusion Detection and Prevention System (IDPS)
Intrusion Detection System
⭐
28
IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including perhaps insider.
Jube
⭐
23
Jube is an open-source software designed for monitoring transactions and events. It offers a range of powerful features including real-time data wrangling, artificial intelligence, decision making, and case management. Jube's exceptional performance is particularly evident in its application to fraud prevention and abuse detection scenarios.
Teler Proxy
⭐
22
🔐 teler Proxy enabling seamless integration with teler WAF 🛡️ to protect locally running web service against a web-based attacks. 🥷
Thebriarpatch
⭐
22
An extremely crude, lightweight Web Frontend for Suricata/Bro to be used with BriarIDS
Wave
⭐
22
802.11 IDS, visualizer, and analytics platform for the web
Unsw_nb15
⭐
20
Feature coded UNSW_NB15 intrusion detection data.
Wazuh Chef
⭐
19
Wazuh - Chef cookbooks
Ipal_ids_framework
⭐
17
Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.
Sauruss Autonomous Drone Surveillance
⭐
17
An autonomous drone and sensor based surveillance system that use a Tello Drone, an Arduino, a Raspberry Pi and an Android smartphone.
Netmoth
⭐
16
🚀 A lightweight, fast, simple and complete solution for traffic analysis and intrusion detection.
Ml Ids
⭐
16
🔍 Machine-learning-based intrusion detection
Vagrant Ids
⭐
16
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Cic Ids 2018
⭐
16
CSE-CIC-IDS-2018 analyze with Random Forest
Firegex
⭐
15
Firegex is an application firewall created for CTF Attack-Defence competitions by Pwnzer0tt1
Gosure
⭐
15
File integrity implemented in Go
Ip Blackhole
⭐
14
IP.blackhole.monster is an IP blacklist that uses multiple sensors to identify network attacks (e.g. SSH brute force) and spam incidents. All reports are evaluated and in case of too many incidents the responsible IP holder is informed to solve the problem.
Overview
⭐
14
Cyber Warfare is a free and open source international intrusion detection and prevention advisory
Burn
⭐
14
[WIP] Anti-Forensics ToolKit to clear post-intrusion sensible logfiles 🔥 (For Research Only)
Tr1pd
⭐
13
tamper resistant audit log
Idseventgenerator
⭐
11
aka GENESIDS: Reads and parses rules using a "snort like" syntax and generates and sends packets that trigger events in signature based IDS (Intrusion Detection Systems) using these rules
Multimedia_sharing_tool
⭐
11
Share video, screen, camera and audio with an RTSP stream through Lan or Wan supporting CUDA computations in a High Performance embedded environment (Nvidia Jetson Nano), applying real-time AI techiques of Intrusion Detection with bounding boxes localization and frames manipulations.
Sqlserverloginmonitor
⭐
11
Brute force attack prevention for remotely accessible SQL Server databases using PowerShell and Windows Task Scheduler API
Rf Ids
⭐
11
Machine Learning Based - Intrusion Detection System
Lua Spylog
⭐
11
Execute actions based on log records
Dsu_insure_sp19_ids_prioritization
⭐
10
IDS Alert Prioritization INSuRE Research Project
Stormlightdinosaur
⭐
10
Intrusion Detection C# app for standlone Windows workstations
Alert Data Set
⭐
10
Scripts to generate and analyze the AIT alert data set (AIT-ADS)
Mlids
⭐
10
Machine Learning Intrusion Detection and Network Monitor written in C#
Aecid Alert Aggregation
⭐
10
A method for grouping, clustering, and merging semi-structured alerts
Wazuh Bosh
⭐
10
Wazuh - Release for Bosh.io
Servercloak
⭐
9
Intrusion Detection and Defense System for windows
Oneclasssvm
⭐
9
A one class svm implementation to detect the anomalies in network.
Nginx Waf Docker
⭐
9
docker modsecurity reverse proxy WAF based on nginx
Documentation
⭐
9
wolfSSL product manuals and documentation.
Aeids Py
⭐
8
AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic using Autoencoder.
Idcas
⭐
8
Intrusion Detection and Counter Attack System - CTF Attack/Defense tool
Odd Services
⭐
8
Detect weird services on a network.
1-100 of 123 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.