There are 30 repositories under intrusion-detection-system topic.
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Slips, a free software behavioral Python intrusion prevention system (IDS/IPS) that uses machine learning to detect malicious behaviors in the network traffic. Stratosphere Laboratory, AIC, FEL, CVUT in Prague.
Implementation/Tutorial of using Automated Machine Learning (AutoML) methods for static/batch and online/continual learning
Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGBoost, stacking, k-means, Bayesian optimization..)
The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)
UnSupervised and Semi-Supervise Anomaly Detection / IsolationForest / KernelPCA Detection / ADOA / etc.
Machine Learning with the NSL-KDD dataset for Network Intrusion Detection
This is the repo of the research paper, "Evaluating Shallow and Deep Neural Networks for Network Intrusion Detection Systems in Cyber Security".
Data stream analytics: Implement online learning methods to address concept drift and model drift in data streams using the River library. Code for the paper entitled "PWPAE: An Ensemble Framework for Concept Drift Adaptation in IoT Data Streams" published in IEEE GlobeCom 2021.
Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives output with cryptographic hashes.
A Novel Statistical Analysis and Autoencoder Driven Intelligent Intrusion Detection Approach
Simple Implementation of Network Intrusion Detection System. KddCup'99 Data set is used for this project. kdd_cup_10_percent is used for training test. correct set is used for test. PCA is used for dimension reduction. SVM and KNN supervised algorithms are the classification algorithms of project. Accuracy : %83.5 For SVM , %80 For KNN
Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
An Intrusion Detection System based on Deep Belief Networks
An online learning method used to address concept drift and model drift. Code for the paper entitled "A Lightweight Concept Drift Detection and Adaptation Framework for IoT Data Streams" published in IEEE Internet of Things Magazine.
Machine learning based Intrusion detection system (IDS)
IoT intrusion Detection Model based on neural network and random forests
ebpH (Extended BPF Process Homeostasis) monitors process behavior on your system to establish normal behavioral patterns. ebpH reports anomalous behavior and prevents attacks by denying anoamlous access requests.
Baseline experiments on training a Decision Tree Classifier and a Random Forest Classifier using Grid Search with Cross Validation on the CIC IDS 2018 dataset for training Machine Learning network intrusion detection classifier models.
wolfSSL Intrusion Detection and Prevention System (IDPS)
Data stream analytics: Implement online learning methods to address concept drift and model drift in dynamic data streams. Code for the paper entitled "A Multi-Stage Automated Online Network Data Stream Analytics Framework for IIoT Systems" published in IEEE Transactions on Industrial Informatics.
CSE-CIC-IDS-2018 analyze with Random Forest
Whenever founds internet connectivity confirms is it you, if not log you off and send you image of intruder.
Collection of Snort 2/3 rules.
Aoandon (青行燈) is a minimalist network intrusion detection system (NIDS).
An Ubuntu 16.04 build containing Suricata, PulledPork, Bro, and Splunk
Network Intrusion Detection System
Network data classifier based on the recurrent neural network.
Intrusion detection engine for Cloud Systems built using Alternative Fuzzy C-mean Clustering and Artificial Neural Network
source code for USENIX Security paper xNIDS
SNORT GUI: Your very own trusted blueteam forensic companion for SNORT IDS. OPTIMIZED, SECURE AND ABSOLUTELY FREE!