Repository navigation
intrusion
- Website
- Wikipedia
Real-time HTTP Intrusion Detection
Feature coded UNSW_NB15 intrusion detection data.
Network intrusion detection with Machine Learning (Deep Learning) experiment : 1d-cnn, softmax, neural networks, convolution
Adversary emulation for EDR/SIEM testing (macOS/Linux)
Intrusion Detection is a technique to identify the abnormal behavior of system due to attack. The unusual behavior of the environment is then identified and steps are taken and methods are formed to classify and recognize attacks. Data set containing a number of records sometimes may decrease the classifiers performance due to redundancy of data. The other problems may include memory requirements and processing power so we need to either reduce the number of data or the number of records. Feature Selection techniques are used to reduce the vertical largeness of data set. This project makes a comparative study of Particle Swarm Optimization, Genetic Algorithm and a hybrid of the two where we see that PSO being simpler swarm algorithm works for feature selection problems but since it is problem dependent and more over its stochastic approach makes it less efficient in terms of error reduction compared to GA. In standard PSO, the non-oscillatory route can quickly cause a particle to stagnate and also it may prematurely converge on sub optimal solutions that are not even guaranteed to be local optimum. A further drawback is that stochastic approaches have problem-dependent performance. This dependency usually results from the parameter settings in each algorithm. The different parameter settings for a stochastic search algorithm result in high performance variances. In this project the modification strategies are proposed in PSO using GA. Experimental results show that GA performs better than PSO for the feature selection in terms of error reduction problems whereas hybrid outperforms both the model in terms of error reduction.
SecRep Is a Repository That Contain Useful Intrusion, Penetration and Hacking Archive Including Tools List, Cheetsheet and Payloads
Intrusion. Custom Asterisk dial plan for listen, whisper and barge in calls. For Asterisk FreePBX, Issabel, Asterisk based Elastix call centers.
Shelly: Reverse shell simple con Python
A powerful penetration testing tool for network reconnaissance and infiltration.
Training materials and code examples using Python in security-related tasks. The focus is on teaching users how to use Python to automate common security tasks, such as vulnerability scanning, penetration testing, and network monitoring.
This is my final year Research Project.. There are 4 components as a). Voter Registration & Authentication Management b). Votes Management and Analyzing System c). Live Data Ingestion & Attacks Detection System d). Staff Members and Security Members Allocation.