RSS 5 projects tagged "IDS"

Download No website Updated 19 Mar 2014 Zentyal

Screenshot
Pop 337.59
Vit 20.55

Zentyal Server aims at offering small and medium businesses (SMBs) a native drop-in replacement for Windows Small Business Server and Microsoft Exchange Server which can be set up in less than 30 minutes and is both easy to use and affordable.

Download Website Updated 09 Apr 2010 TinyIDS

Screenshot
Pop 48.04
Vit 1.00

TinyIDS is a distributed intrusion detection system (IDS) for Unix systems. It is based on the client/server architecture and has been developed with security in mind. The client, tinyids, collects information from the local system by running its collector backends. The collected information may include anything, from file contents to file metadata or even the output of system commands. The client passes all this data through a hashing algorithm and a unique checksum (hash) is calculated. This hash is then sent to one or more TinyIDS servers (tinyidsd), where it is compared with a hash that had previously been stored in the databases of those remote servers for this specific client. A response indicating the result of the hash comparison is finally sent back to the client. Management of the remotely stored hash is possible through the client's command line interface. Communication between the client and the server can be encrypted using RSA public key infrastructure (PKI).

Download No website Updated 27 Apr 2010 NSIA

Screenshot
Pop 39.43
Vit 38.17

NSIA (Network System Integrity Analysis) is a Web application monitoring system that scans sites for potentially unwanted context such as defacements, unauthorized changes, errors, information leaks, profanity, and compliance issues. It operates as an IDS (Intrusion Detection System) for Web sites.

Download No website Updated 19 Aug 2013 LoginIDS

Screenshot
Pop 36.46
Vit 25.12

LoginIDS provides functions to analyze log files from different services in order to detect unusual login behavior. The normal user behavior is learned by analyzing log files and saved in a database. Logins are analyzed by time, service, source, and destination address. If a user's login is new or considered unlikely by LoginIDS, an alert is generated. Alerts can be handled by external scripts and viewed using the log file management system Splunk and the LoginIDS App.

No download No website Updated 15 Apr 2013 Nova: Network Anti-Reconnaissance Tool

Screenshot
Pop 92.21
Vit 1.96

Nova is a software application for preventing and detecting hostile network reconnaissance (such as nmap scans). It does this by first creating the Haystack: a large collection of low interaction honeypots using an updated version of Honeyd. Finding real machines on the network becomes like finding a needle in a haystack of fake machines. Second, Nova uses machine learning algorithms to automatically detect and classify attempts at hostile reconnaissance, so there's no need to go searching manually through your honeypot's log files. It provides an easy to use Web-based interface powered by Node.js to configure itself and Honeyd instances.

Screenshot

Project Spotlight

Code Manager 2

A simple single site code management and package management system.

Screenshot

Project Spotlight

finit

A small SysV init replacement with process supervision.