This repository contains the final project for the Magshimim program, focused on Intrusion Detection Systems (IDS). The project includes code for simulating various cyber attacks, detecting these attacks using different techniques, and a user interface (UI) to visualize some of the attacks and detections.
- 8 attacks and detections.
- UI for some of the attacks and detections.
- Machine learning detection for some of the attacks.
- ARP Spoofing
- DHCP Spoofing
- DHCP Starvation
- HTTP Flood
- Ping Flood
- Port Scan
- SlowLoris
- TCP SYN Flood
To run this project, follow these steps:
- Clone the repository:
git clone https://github.com/yardenfalik/IDS-Project.git
- Install the required dependencies (e.g., using
pip install -r requirements.txt
). - Navigate to the specific directory you want to explore (e.g.,
cd attacks/
orcd detection/
). - Run the relevant scripts or code according to the provided instructions in each directory's README file.
Note: Please be aware that the code in this repository is intended for educational and research purposes only. Any unethical or illegal use of this code is strictly prohibited, and the user is solely responsible for their actions.
Contributions are welcome! Feel free to submit issues or pull requests.
This project is licensed under the MIT License. See the LICENSE file for more details.
The code provided in this repository is for educational and research purposes only. The authors and contributors of this project are not responsible for any misuse or unethical use of the code. Users are solely responsible for their actions and must ensure they comply with all applicable laws and regulations.