IDS based on Machine Learning technical
☆20Nov 12, 2018Updated 7 years ago
Alternatives and similar repositories for ids-machine-learning
Users that are interested in ids-machine-learning are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A preprocessor module for Snort that uses ML algorithms for pruning, clustering and finding correlation between alerts☆32Jun 27, 2019Updated 6 years ago
- This repository contains a notebook implementing an autoencoder based approach for intrusion detection, the full documentation of the stu…☆31Feb 20, 2019Updated 7 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Home router IDS solution with a Raspberry Pi 3. Dynamically resolves device name, manufacturer, and alerts user of Snort analytics throug…☆14Apr 4, 2019Updated 7 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆10Oct 12, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Anomaly IDS using a one-class autoencoder.☆11Oct 31, 2019Updated 6 years ago
- Full pipeline for log analysis and anomaly detection.☆18Feb 11, 2020Updated 6 years ago
- Hardware design files for the PMOD based MUX☆13Aug 22, 2019Updated 6 years ago
- A set of tools to help users proxy requests in docker based on domains☆14Jan 7, 2017Updated 9 years ago
- How to send structured Snort IDS alert logs into Graylog☆27Oct 20, 2025Updated 5 months ago
- An automatically updated list of IP addresses associated with the widely used free and privacy-focused VPN provider, ProtonVPN.☆30Updated this week
- Example code included in the "Improving Your Embedded Linux Security Posture with Yocto" whitepaper☆17Apr 21, 2022Updated 3 years ago
- Machine Learning with the NSL-KDD dataset for Network Intrusion Detection☆273Apr 5, 2020Updated 6 years ago
- A Python script that generates Snort IDS rules from network packets☆24Oct 30, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Bulk domain/website change monitoring tool w/ screen capture, gallery, and email notification☆19May 24, 2019Updated 6 years ago
- ☆11Sep 23, 2016Updated 9 years ago
- This is a threat intelligence automatic crawling tool that also contains some high-value threat intelligence.☆21Jun 2, 2021Updated 4 years ago
- ☆22Nov 25, 2019Updated 6 years ago
- ☆23Jan 15, 2021Updated 5 years ago
- A list of ICS scanners. It is an aggregation of multiple sources (honeypot, shodan, greynoise...).☆17Oct 24, 2020Updated 5 years ago
- The proposed hybrid IDS is tested on two public network datasets, the CSE-CIC-IDS2018 and the TON IoT datasets, representing internal and…☆15May 18, 2022Updated 3 years ago
- ☆12Nov 1, 2024Updated last year
- ☆24Apr 17, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆16Jan 5, 2018Updated 8 years ago
- Network data classifier based on the recurrent neural network.☆20Apr 3, 2019Updated 7 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆145Jan 5, 2019Updated 7 years ago
- This is a gem that provides the ability to create a workspace, import scan data from nexpose, and perform a webscan, a web audit, and per…☆10Dec 13, 2017Updated 8 years ago
- Yet Another Nand Dumper☆23Sep 7, 2023Updated 2 years ago
- Siemens SIMATIC vulnerabilities☆24Feb 10, 2022Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Massive Pcap Analyzer with Massive Multithreading (DEF CON 26)☆32Jan 14, 2022Updated 4 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- Docker container of SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3☆10Oct 9, 2016Updated 9 years ago
- A small script to import and ban IPs from a list (like from blocklist.de)☆14Oct 23, 2016Updated 9 years ago
- App for storing FireHOL feeds (https://github.com/firehol/blocklist-ipsets) with a history of adding and removing each address☆35Jan 4, 2023Updated 3 years ago
- DNS Amplification IPTABLES block lists and Rules against DNS Attacks☆11Oct 25, 2016Updated 9 years ago