lnutimura / ml_classifiersLinks
A Snort 3 Machine Learning-based Inspector for Bidirectional Network Flow Classification.
☆19Updated 5 years ago
Alternatives and similar repositories for ml_classifiers
Users that are interested in ml_classifiers are comparing it to the libraries listed below
Sorting:
- Suricata rules that can detect a wide range of threats, including malware, exploits, and other malicious activity especially web applicat…☆60Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆64Updated 2 years ago
- ☆71Updated 7 years ago
- This is a five-step framework for the development of intrusion detection systems (IDS) using machine learning (ML) considering model real…☆57Updated last month
- SNORT GUI: sniff sniffs the baddies and helps you setup SNORT ids in your network☆28Updated 6 months ago
- Network Protocol Analyzer & Deshboard (Cyber Security)☆38Updated last year
- A logic-based enterprise network security analyzer☆137Updated 3 years ago
- ☆10Updated 6 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Updated 5 years ago
- An environment for testing AI pentesting agents against a simulated network.☆204Updated last year
- IDS monitors a network or systems for malicious activity and protects a computer network from unauthorized access from users,including pe…☆105Updated 3 years ago
- Combined datasets of ECML/PKDD 2007 and CSIC 2010☆36Updated last year
- ☆18Updated 8 months ago
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- A research platform to develop automated security policies using quantitative methods, e.g., optimal control, computational game theory, …☆140Updated this week
- 🇻🇳 [VNCERT/CC] Digital Forensics Lab 🇻🇳☆21Updated last year
- Industrial Intrusion Detection - A framework for protocol-independent industrial intrusion detection on top of IPAL.☆28Updated 4 months ago
- The best tools and resources for forensic analysis.☆168Updated 2 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆42Updated 5 years ago
- Public datasets to help you address various cyber security problems.☆463Updated 3 years ago
- Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), appli…☆237Updated 2 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆67Updated 6 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆219Updated last year
- Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma☆21Updated 2 years ago
- A machine learning based Intrusion Detection System☆162Updated 6 years ago
- Machine-learning-based intrusion detection☆38Updated 7 years ago
- This repository is focused on cybersecurity in the industrial world. Many industrial communication protocols and equipment is investigate…☆169Updated 3 years ago
- ☆31Updated 7 years ago
- MODBUS Penetration Testing Framework☆91Updated 10 years ago