66 results for “topic:network-security-monitoring”
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
A Linux packet crafting tool.
Respounder detects presence of responder in the network.
An open standard for hashing network flows into identifiers, a.k.a "Community IDs".
Mapping NSM rules to MITRE ATT&CK
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
A website and framework for testing NIDS detection
Real-time Packet Observation Tool
Highly customizable low-interaction experimental honeypot that mimics specific hosts.
Automation of VPC Traffic Mirror Sessions in AWS
Jxnet is a Java library for capturing and sending custom network packet buffers with no copies. Jxnet wraps a native packet capture library (libpcap/winpcap/npcap) via JNI (Java Native Interface).
A machine learning program, that detects denial of service attack using machine learning technique.
A Python implementation of the Community ID flow hashing standard
Go implementation of the Community ID flow hashing standard
A set of tools and procedures for automating NSM and NIDS deployments in AWS
This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup a Suricata Port Mirrored Server
Automate the deletion of AWS VPC Traffic Mirror Sessions
A legal and educational tool for cybersecurity testing and ethical hacking.
Overnight Hercules for Network Security: Become a Security Analyst book
This repository shows all the hands on experience on Palo Alto Firewall, assignment and projects I have done in My Palo Alto Specialization Journey.
Linux Network Defense Scripting (BASH)
Templates for writing applications using Zeek NSM communication library Broker
Real-Time Detection of Multi-Stage Attacks using Kill Chain State Machines: Detect multi-stage attacks by correlating alerts from Intrusion Detection Systems (IDS) to generate scenario graphs. By prioritising alerts based on the kill chain model the RT-KCSM reduces false-positive alerts.
Curated Blue Team toolkit for defensive cybersecurity: asset discovery, vulnerability management, network monitoring, DFIR, threat intelligence, cryptography, endpoint security and SIEM/log management.
A Full Fledged iptables Firewall automation framework For Linux with Log monitoring..
Network Intrusion Detection analysis and enhancement of IDS tool outputs to identify probable bad actors/malware versus distracting corpware beacons
Documentation of the MMT (Montimage Monitoring Tool) framework
zeek network security monitoring NIDS HIDS
Use nmap and other network tools easily and efficiently
Log analysis tool for detecting C2 beaconing, DNS anomalies, and SSH intrusions with geo-enrichment and Kibana visualization