127 results for “topic:nids”
A website and framework for testing NIDS detection
A PyTorch implementation of of E-GraphSAGE.
GO开发而成,用于NIDS HIDS 分析的规则引擎,使用WorkerPool 高性能检测,支持多字段 "和" "或" 检测, 支持频率检测
Yara powered NIDS with high speed packet capture powered by PF_RING
Sensor software
tshark + ELK analytics virtual machine
A website and framework for testing NIDS detection
Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web I/O System.
这是一个封装了KDDCup99、NSL-KDD、UNSW-NB15等入侵监测数据集的Python包。
A PyTorch implementation of of Anomal-E.
Easily Expandable Wireless Intrusion Detection System
Download UNSW-NB15 and CIC-IDS2017 Datasets for Network Intrusion Detection (NIDS)
En este proyecto se evalúan y comparan diferentes técnicas de aprendizaje automático para la detección de intrusiones en red.
Scripts to deploy virtual testbed for log data analysis and anomaly detection.
A method for grouping, clustering, and merging semi-structured alerts
Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning (RNN) models, MERN web I/O System. The deployed project link is as follows.
suricata-check is a command line utility to provide feedback on Suricata rules. The tool can detect various issues including those covering syntax validity, interpretability, rule specificity, rule coverage, and efficiency.
Cyber Security: Development of Network Intrusion Detection System (NIDS), with Machine Learning and Deep Learning, Recurrent Neural Network models, MERN web I/O System.
Deep Model Intrusion Detection (IDS) Evaluation of NSL KDD and CIC IDS 2018 datasets.
setup zeek, previously Bro IDS
No description provided.
Hyperparameter Optimization for 1D-CNN-Based Network Intrusion Detection Using GA and PSO
Machine Learning-based Intrusion Detection System (IDS) tailored for resource-constrained networks
modular and extensible Kasane Teto based NIDS/HIDS (intrusion detection system)
Home router IDS solution with a Raspberry Pi 3. Dynamically resolves device name, manufacturer, and alerts user of Snort analytics through email or text. Currently handles around 15,000 rules.
AEIDS is a prototype of anomaly-based intrusion detection system which works by remembering the pattern of legitimate network traffic using Autoencoder.
Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack
Tag Generation and Text Generation Inference for Network Packets using Transformers
Your detection lab at home
Mass Suricata rules creator, from a list of domain