Skip to content

An IDS project simulating cyber attacks and detecting them using various techniques, including machine learning. Includes a UI for visualization. Part of the Magshimim program. For educational purposes only.

License

Notifications You must be signed in to change notification settings

yardenfalik/IDS-Project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

20 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

IDS Project - Magshimim Final Project

This repository contains the final project for the Magshimim program, focused on Intrusion Detection Systems (IDS). The project includes code for simulating various cyber attacks, detecting these attacks using different techniques, and a user interface (UI) to visualize some of the attacks and detections.

Table of Contents

Features

  • 8 attacks and detections.
  • UI for some of the attacks and detections.
  • Machine learning detection for some of the attacks.

Attacks And Detections

  • ARP Spoofing
  • DHCP Spoofing
  • DHCP Starvation
  • HTTP Flood
  • Ping Flood
  • Port Scan
  • SlowLoris
  • TCP SYN Flood

Usage

To run this project, follow these steps:

  1. Clone the repository: git clone https://github.com/yardenfalik/IDS-Project.git
  2. Install the required dependencies (e.g., using pip install -r requirements.txt).
  3. Navigate to the specific directory you want to explore (e.g., cd attacks/ or cd detection/).
  4. Run the relevant scripts or code according to the provided instructions in each directory's README file.

Note: Please be aware that the code in this repository is intended for educational and research purposes only. Any unethical or illegal use of this code is strictly prohibited, and the user is solely responsible for their actions.

Contributing

Contributions are welcome! Feel free to submit issues or pull requests.

License

This project is licensed under the MIT License. See the LICENSE file for more details.

Disclaimer

The code provided in this repository is for educational and research purposes only. The authors and contributors of this project are not responsible for any misuse or unethical use of the code. Users are solely responsible for their actions and must ensure they comply with all applicable laws and regulations.

About

An IDS project simulating cyber attacks and detecting them using various techniques, including machine learning. Includes a UI for visualization. Part of the Magshimim program. For educational purposes only.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published