zenny / SD-PerimeterLinks
Software Defined Perimeter using readily available Open Source components
☆11Updated 7 years ago
Alternatives and similar repositories for SD-Perimeter
Users that are interested in SD-Perimeter are comparing it to the libraries listed below
Sorting:
- A proof of concept Software Defined Perimeter (SDP) implementation using OpenSPA for service hiding☆58Updated 3 years ago
- OpenSPA - An open and extensible Single Packet Authorization (SPA) protocol☆102Updated 3 years ago
- Control Module for Software Defined Perimeter (SDP)☆89Updated 5 years ago
- Client and Gateway Modules for Software Defined Perimeter (SDP)☆90Updated 3 years ago
- dpdk infrastructure for software acceleration. Currently working on RX and ACL pre-filter☆90Updated 4 years ago
- Application layer protocol identification of traffic flows☆226Updated 3 years ago
- add dpdk interface and packet processing to suricata in worker mode☆64Updated 5 years ago
- Network traffic classification library that requires minimal application payload☆218Updated last year
- suricata源码分析和读书笔记☆23Updated 8 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆58Updated 5 years ago
- Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number …☆67Updated 6 years ago
- Tiny nDPI based deep packet inspection daemons / toolkit.☆89Updated last month
- Be compatible with VPP20.01(StrongSwan 5.7.2dr2/Linux 3.10.0-862.el7.x86_64)☆19Updated 4 years ago
- gonids is a library to parse IDS rules, with a focus primarily on Suricata rule compatibility. There is a discussion forum available that…☆191Updated 6 months ago
- Digital Bond's IDS/IPS rules for ICS and ICS protocols.☆150Updated 5 years ago
- nDPI Demo☆13Updated 9 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆123Updated last month
- Mercury: network metadata capture and analysis☆495Updated last week
- Passive Real-time Asset Detection System☆249Updated last year
- The Libnids parallelized on commercial multi-core systems☆27Updated 8 years ago
- Snort rules☆11Updated 10 years ago
- snort3.0 源码分析☆35Updated 6 years ago
- SCADA network attack datasets and process logs☆20Updated 8 years ago
- Using Python script instead of Nmap NSE script to detect ICS protocols[根据nmap nse脚本来编写工控协议识别的python脚本]☆33Updated 5 years ago
- Anomaly detection based on DNS traffic analysis☆54Updated 5 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆76Updated last year
- Retina is a network analysis framework that supports 100+ Gbps traffic analysis on a single server with no specialized hardware.☆190Updated 3 months ago
- ☆24Updated 9 years ago
- Intrusion Prevention System to dynamically add firewall rules to block malicious traffic detected by IDS system implemented on Software D…☆51Updated 8 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆71Updated 2 years ago