Showing 99 open source projects for "aide intrusion detection"

View related business solutions
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • 1
    Shoki is a free, open source network intrusion detection system. The fundamental design goals are simplicity and modularity, and the focus is on traffic analysis rather than content inspection.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The subject of this project is development of the Intrusion Detection System (IDS) with Artificial Neural Network (ANN). This model will allow the implementation of a system capable to analyze and to identify possible intrusions, based on the method of an
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    QuIDScor is a daemon software integrating Intrusion Detection Systems (IDS) and vulnerability assesment and management platforms. Today QuIDScor correlates and verifies Snort alerts against QualysGuard vulnerability assessment data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    STAT is a framework for building modular, stateful signature-based intrusion detection systems. STAT provides a means to develop sensors which operate in different domains and environments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Manage your IT department more effectively Icon
    Manage your IT department more effectively

    Streamline your business from end to end with ConnectWise PSA

    ConnectWise PSA (formerly Manage) allows you to stop working in separate systems, and helps you build a more profitable business. No more duplicate data entries, inefficient employees, manual invoices, and the inability to accurately track client service issues. Get a behind the scenes look into the award-winning PSA that automates processes for each area of business: sales, help desk, support, finance, and HR.
  • 5
    JavaIDMEF is an implementation of IDMEF in Java originally developed by Chris McCubbin. The Intrusion Detection Message Exchange Format (IDMEF) describes the structure and transport facility of information between IDS and management.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    File System Saint is a lightweight host-based intrusion detection system with primary focus on speed and ease of use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Pace-IDS is an Intrusion Detection system designed to replace Tripwire, in that it is faster, and more effective of detecting trojan activity, and is easier to configure. All you have to do usually is simply change one variable to your email address.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Free Agents DIDS is a distributed intrusion detection system that you place on each host on your network. Agents intercommunicate with aes encryption, automatically alert you, and secure your network for free!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SnortKonsole is a Java-Frontend for the Open Source Network Intrusion Detection System Snort. It supports all configuration-aspects of Snort. The configuration distribution and activating of sensors is done via scp/ssh.
    Downloads: 0 This Week
    Last Update:
    See Project
  • All-in-One Payroll and HR Platform Icon
    All-in-One Payroll and HR Platform

    For small and mid-sized businesses that need a comprehensive payroll and HR solution with personalized support

    We design our technology to make workforce management easier. APS offers core HR, payroll, benefits administration, attendance, recruiting, employee onboarding, and more.
  • 10
    Komoku implements an intrusion detection system using embedded system. Unlike other integrity tools, as tripwire, it does not rely on the operating system. The IDS is actually implemented in an INtel EBSA-285 board.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Firestorm is an extremely high performance network intrusion detection system (NIDS). At the moment it just a sensor but plans are to include real support for analysis, reporting, remote console and on-the-fly sensor configuration. It is fully pluggab
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    AVirCAP is a system for manual and / or automated detection of CodeRed and Nimda type of hack attempts and virtually all other kinds of "logable" intrusion attempts. It can work stand alone or together with other additional AVirCAP machines in the LAN/W
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Prelude is an Hybrid Intrusion Detection system. It is composed of differents sensors and of a Manager. Currently distributed is an NIDS sensor. the Manager is for reporting attacks in an user readable form. Prelude is completly modulable and distributed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Take your ipfw based firewall logs and do something useful with them. Use this program to submit them to dshield.net, the distributed intrusion detection system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Distributed and Hybrid Intrusion Detection and Response System
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Immune Security Architecture For your Enterprise -- Host-Based Intrusion detection for UNIX based systems, at the process level. Detect changes in the normal behavior of processes, advanced features to detect Buffer Overflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    The Linux Intrusion Detection System is a patch which enhances the kernel's security. When it's in effect, many system administration operations can be made impossible even for root. You can turn the security protection on or off online and you can hide
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    SIDEN is a distributed network discovery tool used for intrusion detection research purposes. It simulates coordinated/distributed network probes against a network. The traffic generated can then be analyzed to improve Intrusion Detection Systems.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SENTINIX is a GNU/Linux distribution designed for monitoring, intrusion detection, penetration testing, auditing, statistics/graphing and anti-spam. It's completely free; free to use, free to modify and free to redistribute.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    cinderella is a prototype for a network intrusion detection system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Experimental Hybrid Intrusion Detection System written in Java
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Symwire is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in open c for symbian. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    KFW aims to be a simple to use but powerful Firewall/IDS. That will have a GUI designed since its origins, and will use state of the art firewalling and intrusion detection techniques to achieve maximum performance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Turn-key secure credit card processing appliance
    Downloads: 0 This Week
    Last Update:
    See Project