[go: up one dir, main page]

Showing 19 open source projects for "intrusion detection"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • With Boozang, you can write tests, debug visually, perform root cause analysis and automate your CI builds. Icon
    With Boozang, you can write tests, debug visually, perform root cause analysis and automate your CI builds.

    Empower your whole team to build and maintain automated tests, not just developers.

    Our natural-language tests are extremely stable to code changes. When tests break our AI will repair it in minutes.
    Learn More
  • 1

    jfail2ban

    java alternative to Fail2ban

    The goal of jfail2ban is to provide platform independent intrusion detection similar to Fail2ban.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    smartIDS

    Lightweight intrusion detection for IoT and embedded devices.

    The aim of the project is a lightweight intrusion detection library for embedded devices which supports MSP430 and ARM Cortex based devices. Features include DSP/SIMD support, IoT and embedded protocols, distributed operation, event and history management, tool supported configuration and visualization. There is a Java port that supports less features.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    XML-CF-lib

    XML-CF-lib

    TeleScope-CF XML Content Filtering Library

    ...This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusion detection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios. The library could also be used in XML routers and various web services for XML content filtering where XML is a common message passing format.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    telescope-cf-library

    telescope-cf-library

    TeleScope-CF XML Content Filtering Library

    ...This general-purpose library could be used by any Java applications that are involved in the XML message content filtering. Example application scenarios could be intrusion detection, selective rule engines, targeted database insertions during the ETL process and various business logic scenarios. The library could also be used in XML routers and various web services for XML content filtering where XML is a common message passing format.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Time tracking software for the global workforce Icon
    Time tracking software for the global workforce

    Teams of all sizes and in various industries that want the best time tracking and employee monitoring solution.

    It's easy with Hubstaff, a time-tracking and workforce management platform that automates almost every aspect of running or growing a business. Teams can track time to projects and to-dos using Hubstaff's desktop, web, or mobile applications. You'll be able to see how much time your team spends on different tasks, plus productivity metrics like activity rates and app usage through Hubstaff's online dashboard. Most of the available features are customizable on a per-user basis, so you can create the team management tool you need.
    Learn More
  • 5

    RIDSystem

    capturing packet and detecting intruders with their signature

    Introduction: This project has been developed to detecting intruder activity in your network according to the existing signature of intrusion attacks,Anomalous behaviour etc... Scope: Government authorities has lot of information about defence,revenue,income tax and many informations. Intrusion Detection System will certainly minimize the unauthorized access and take immediate response to stop such illegal works. MNCs manages their whole information system using application software over their network.It will be helpful to monitor all the activity in the network. ...
    Leader badge">
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The Realeyes IDS captures and analyzes full sessions. The graphical user interface will display both halves of captured sessions to determine what occurred. The GUI also provides management of application users, sensors, and the database.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Optical Detection of a zone to detect intrusion to it. First version just works an bitmap-file-basis (for algorithm-development)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Intrusion Detection System made in Java using Snort rule files. The main feature of Nyx are distributiveness, Java based, Software Agent implemented. Iteration 1 has finished. Still more features has to be extended
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    An open-source configurable virtual testbed (based on the Eucalyptus cloud platform) for Intrusion Detection System Evaluation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • White Labeled Fintech Software Solutions | Centrex Icon
    White Labeled Fintech Software Solutions | Centrex

    Centrex is a full suite of white labeled fintech solutions built and designed for brokers, lenders, banks, investors, fintechs

    The Centrex products include: CRM, loan origination, loan and advance servicing software, syndication management, white labeled mobile app, money manager, underwriting, Esign, and website smart app builder. The Centrex services include: fintech software consulting, admin retainer services, and managed data cloud.
    Learn More
  • 10
    Siganture Translator is a Java application which can translate signatures between different IDS's and Common Intrusion Detection Signatures Standard (CIDSS).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    IceIDS is heuristic Network Intrusion Detection System (NIDS) based on calculating Student's distributions of network traffic.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    The Network Security Response Framework (NSRF) allows for testing different computer security response engines and methodologies. It supports simulated and real: Intrusion Detection Systems (sensors), Attacks, and Responses.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    InSecT - Invincible Security Technology - an intelligent firewall and intrusion detection system
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The Intrusion Detection Exchange Protocol (IDXP) is an application-layer protocol for exchanging data between intrusion detection entities. IDXP-Java is a Java-based implementation based upon the Java BEEP Core implementation of RFC 3080 / RFC 3081.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A Java-based client-server architecture for processing network intrusion detection data. The server receives XML alerts from Snort sensors buffers them for review by clients. The console provides a real-time view of IDS activity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    JavaIDMEF is an implementation of IDMEF in Java originally developed by Chris McCubbin. The Intrusion Detection Message Exchange Format (IDMEF) describes the structure and transport facility of information between IDS and management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SnortKonsole is a Java-Frontend for the Open Source Network Intrusion Detection System Snort. It supports all configuration-aspects of Snort. The configuration distribution and activating of sensors is done via scp/ssh.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    ennids

    Entropy Network Intrusion Detection System

    Detecting malicious network traffic using entropy based methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Experimental Hybrid Intrusion Detection System written in Java
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next