Network Security for Intrusion Detection
Comprehensive solutions for securing network infrastructure, traffic, and communications. Task: Intrusion DetectionExplore 13 curated tools and resources
RELATED TASKS
PINNED
Promoted • 4 toolsWant your tool featured here?
Get maximum visibility with pinned placement
LATEST ADDITIONS
A next-generation intrusion prevention system that combines signature-based and behavioral detection techniques to identify and block sophisticated network threats across hybrid environments.
A next-generation intrusion prevention system that combines signature-based and behavioral detection techniques to identify and block sophisticated network threats across hybrid environments.
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
MIDAS (Mac Intrusion Detection Analysis System) - archived and no longer supported.
Fail2ban is a daemon that automatically bans IP addresses showing malicious behavior by monitoring log files and updating firewall rules to prevent brute-force attacks.
Fail2ban is a daemon that automatically bans IP addresses showing malicious behavior by monitoring log files and updating firewall rules to prevent brute-force attacks.
A cross-platform network detection tool that identifies Responder presence by sending LLMNR queries for non-existent hostnames.
A cross-platform network detection tool that identifies Responder presence by sending LLMNR queries for non-existent hostnames.
An open-source network security monitoring tool.
An OpenFlow honeypot that detects unused IP addresses and simulates network traffic to attract and analyze potential threats
An OpenFlow honeypot that detects unused IP addresses and simulates network traffic to attract and analyze potential threats
A multi-threaded intrusion detection system using Yara for network and stream IDS
A multi-threaded intrusion detection system using Yara for network and stream IDS
Automated signature creation using honeypots for network intrusion detection systems.
Automated signature creation using honeypots for network intrusion detection systems.
Netcap efficiently converts network packets into structured audit records for machine learning algorithms, using Protocol Buffers for encoding.
Netcap efficiently converts network packets into structured audit records for machine learning algorithms, using Protocol Buffers for encoding.
Object scanning system with scalable and flexible architecture for intrusion detection.
Object scanning system with scalable and flexible architecture for intrusion detection.
A wireless network detector, sniffer, and intrusion detection system
Stenographer is a high-performance full-packet-capture utility for intrusion detection and incident response purposes.
Stenographer is a high-performance full-packet-capture utility for intrusion detection and incident response purposes.
Monitors network traffic for suspicious activity and alerts when potential threats are detected.
Monitors network traffic for suspicious activity and alerts when potential threats are detected.