OWASP / Intelligent-Intrusion-Detection-System
☆25Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Intelligent-Intrusion-Detection-System
- An anomaly-based intrusion detection system.☆80Updated last year
- Awesome Cyber-Security Data-sets Collection☆19Updated 6 years ago
- Machine Learning For Cybersecurity.☆63Updated 5 years ago
- Evading Snort Intrusion Detection System.☆75Updated 3 years ago
- The CyberSecurity Framework (CSF for short) is a local Python3 scripting package which aims directly on Cyber Security auditing, where yo…☆38Updated 7 years ago
- Machine Learning for Cyber Security☆28Updated 2 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆27Updated 6 months ago
- A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.☆13Updated 4 years ago
- Machine Learning for Phishing Website Detection☆54Updated 4 years ago
- Collection of cyber security and "AI" relevant topics☆75Updated 6 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆134Updated 5 years ago
- Cyber Threat Intelligence - Toolbox☆50Updated 6 years ago
- The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for…☆19Updated 6 years ago
- Developed an Anomaly-based intrusion detection system using Multi Level Perceptron☆18Updated 3 years ago
- A collection of resources for security data☆40Updated 6 years ago
- ☆15Updated 7 years ago
- DefectDojo Documentation☆15Updated 3 years ago
- ☆62Updated 6 years ago
- The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and…☆13Updated 3 weeks ago
- Yet another OSINT automator.☆19Updated 4 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆35Updated 6 years ago
- Use PyShark and scapy to read fields from a pcap file and populate a CSV☆55Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆74Updated 3 months ago
- A curated list of resources for Cyber Professionals☆16Updated 3 years ago
- Dataset of Probing Attacks (Port Scan) performed with nmap, unicornscan, hping3, zmap and masscan☆29Updated last month
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆23Updated 7 years ago
- CyATP: Cybersecurity Awareness Training Platform☆23Updated 2 years ago
- DGA Domain Detection using Bigram Frequency Analysis☆53Updated 7 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆85Updated last year
- A Python script that generates Snort IDS rules from network packets☆25Updated 7 years ago