Statistics for topic intrusion-detection
RepositoryStats tracks 636,572 Github repositories, of these 65 are tagged with the intrusion-detection topic. The most common primary language for repositories using this topic is Python (19).
Stargazers over time for topic intrusion-detection
Most starred repositories for topic intrusion-detection (view more)
Trending repositories for topic intrusion-detection (view more)
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Network intruder and presence detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.
SQL powered operating system instrumentation, monitoring, and analytics.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showcasing the implementation and comparison of different machine lea...
Network intruder and presence detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.
Code for IDS-ML: intrusion detection system development using machine learning algorithms (Decision tree, random forest, extra trees, XGBoost, stacking, k-means, Bayesian optimization..)
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Network intruder and presence detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.
Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history
SQL powered operating system instrumentation, monitoring, and analytics.
This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showcasing the implementation and comparison of different machine lea...
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
Network intruder and presence detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.
Awesome list of AI for cybersecurity including network (network traffic analysis and intrusion detection), endpoint (anti-malware), application (WAF or database firewalls), user (UBA), process behavio...
Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history
Network intruder and presence detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.
SQL powered operating system instrumentation, monitoring, and analytics.
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics.
This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showcasing the implementation and comparison of different machine lea...
Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history
Sandfly Security Agentless Compromise and Intrusion Detection System For Linux
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Network intruder and presence detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history
Network intruder and presence detector. Scans for devices connected to your network and alerts you if new and unknown devices are found.
SQL powered operating system instrumentation, monitoring, and analytics.
This repository contains an in-depth analysis of the Intrusion Detection Evaluation Dataset (CIC-IDS2017) for Intrusion Detection, showcasing the implementation and comparison of different machine lea...
Lightweight network IP scanner. Can be used to notify about new hosts and monitor host online/offline history
A comprehensive survey of datasets for research in host-based and/or network-based intrusion detection, with a focus on enterprise networks
Code for Identity recognition and intrusion detection in wireless sensing.
OPNSense's Suricata IDS/IPS Detection Rules Against NMAP Scans