Found 22 repositories(showing 22)
o-mdonyelwa
Secure Network & IDS: Simulated cybersecurity threats like DDoS and ARP spoofing in a virtual lab. Implemented a mesh network topology with internal DNS, traffic logging, and an intrusion detection system (IDS) using tools like Wireshark and Snort for real-time threat monitoring.
dimasmamot
Implementation of Spark Structured Streaming with Confluent Apache Kafka package as data source and Apache Avro the datatype, using library from/and million thanks to Tubular/confluent-spark-avro. Data that received was from Snort IDS alert that sent through MQTT,
This project demonstrates the setup and configuration of a comprehensive network security solution in VirtualBox . The lab features an Active Directory (AD) domain with 100 users. The primary focus is on implementing and integrating pfSense (Firewall), Snort (IDS/IPS), and Splunk (SIEM) to secure and monitor the network.
MichaelGW1
You will prepare a web server on the latest version of Ubuntu (a Linux distribution) along with necessary security tools to protect it from popular at tacks using the most popular firewall (IPTables) and intrusion detection system (Snort). Note that the web server is also a SSH server, so you are required to install OpenSSH, and allow SSH traffic to go through as well. You will install, configure, and implement your designed policies using these two security tools. You are required to install LAMP (Linux, Apache, MySQL, PHP stack) on Ubuntu with necessary configurations suitable for your design and implementation. You will write two shell scripts to auto mate the installation and configuration of your system for disaster recovery purposes with comments for every single command: installation.sh: It will include all the commands regarding installation of all the necessary services and tools. Also, all confi guration scripts for LAMP. implementation.sh: It will include all the commands regarding implementing policies for your firewall, IDS, etc. You may use a stream editor such as “sed” to implement them using your automated scripts, if that requires editing s pecific files.
7chemical-linux
Full snort setup in windows in easy way with some basic implementation . This pdf developed by me in over 3 weeks . Snort is a IDS and IPS mechanism , but this contain about snort IDS not IPS Process
Implementation of Snort IDS with correlation rules to detect multi-stage attacks on Linux environments (Ubuntu/Metasploitable).
This project provides a step-by-step guide to install and configure Snort IDS/IPS on a VPS. It includes setting up detection rules, managing them with PulledPork, and testing Snort using real-world malware traffic. Ideal for anyone looking to implement or enhance network intrusion detection and prevention.
KauanMess
A simple project implementing IDS and IPS systems with the Snort tool.
FarahTasnurMeem
No description available
Snort IDS Implementation and Integration with Splunk
Nirali011
Snort IDS implementation with custom rules and alert generation
KiranKarenavar
Implementation of Snort as an Intrusion Detection System (IDS) with analysis and overview of IPS functionality.
bibulinuk-ux
Implementation of Snort-based Intrusion Detection System (IDS) in a local network lab environment with custom rule configuration and traffic analysis.
This project aims to design and implement an intelligent hybrid IDS pipeline that combines Snort’s signature detection with ML-driven classification.
Surajkumar4-source
This implementation covers Snort installation and configuration in Inline Mode on CentOS, enabling IPS and IDS functionalities. It includes rule creation for detecting and preventing various network threats, along with methods to bypass and enhance IDS detection.
parmarhitendra
Learn Network Intrusion Detection with Snort IDS through practical implementation. Includes installation guides, custom detection rules, attack simulations (ping floods, port scans, SSH brute force), alert management, and ELK stack visualization.
A virtualized network security lab implementing defense-in-depth strategies. Features a multi-zone topology (Internet, DMZ, LAN) protected by stateful iptables firewalls and monitored by Snort IDS, with live attack simulations.
This repository contains the implementation and documentation for the project "Securing Network Perimeters Using Firewalls, IDS/IPS, and VPNs". The project demonstrates firewall configuration, intrusion detection using Snort, and network traffic monitoring with supporting screenshots and explanations.
This project sets up an intrusion detection and monitoring system using Snort and Splunk in a virtual network environment. It includes attack simulations with Kali Linux, real-time log analysis in Splunk, and custom IDS rule implementation to detect malicious activities.
0xTrust-cell
This project is a fully virtualized Security Operations Center (SOC) home lab designed for hands-on Threat Detection and Incident Response (TDIR) practice. It simulates a small enterprise environment with centralized monitoring via Wazuh, a pfSense firewall with Snort IDS/IPS, and multiple endpoints. Includes SOAR implementation (Shuffle).
Alpi157
End-to-end security assessment in a controlled network: mapped hosts/services, identified and exploited key weaknesses to meet defined data-recovery objectives, then switched to defense by building and validating Snort IDS rules and implementing firewall-based prevention with hardening recommendations.
dimasmamot
Implementation of Spark Structured Streaming with Confluent Apache Kafka package as data source and Apache Avro the datatype, using library from/and million thanks to Tubular/confluent-spark-avro. Data that received was from Snort IDS alert that sent through MQTT and then arranged as a batch and stream job, store the aggregation of data in mongodb and immutable data in hdfs
All 22 repositories loaded