Daemon to ban hosts that cause multiple authentication errors
-
Updated
Nov 7, 2024 - Python
Daemon to ban hosts that cause multiple authentication errors
Main Sigma Rule Repository
Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors in the network traffic. Stratosphere Laboratory, AIC, FEL, CVUT in Prague.
Wazuh - Ruleset
idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)
🚌 Threat Bus – A threat intelligence dissemination layer for open-source security tools.
Code for our USENIX Security 2021 paper -- CADE: Detecting and Explaining Concept Drift Samples for Security Applications
The Snowflake generator done right.
Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
This tool parses log data and allows to define analysis pipelines for anomaly detection. It was designed to run the analysis with limited resources and lowest possible permissions to make it suitable for production server use.
A completely automated anomaly detector Zeek network flows files (conn.log).
Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...
Real-time detection and defense against malicious network activity and policy violations (exploits, port-scanners, advertising, telemetry, state surveillance, etc.)
Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.
Add a description, image, and links to the ids topic page so that developers can more easily learn about it.
To associate your repository with the ids topic, visit your repo's landing page and select "manage topics."