Skip to main content

Standalone hybrid IDS+IPS for Ubuntu/Windows VMs with relay dashboard

Project description

AnomalyX

AnomalyX provides a standalone IDS/IPS agent and a relay dashboard for Ubuntu and Windows VMs.

It captures host traffic, runs hybrid detection (signature + ML + zero-day), uses a fusion policy for risk/action, and applies prevention via host firewall rules (iptables/ip6tables on Ubuntu, netsh advfirewall on Windows).

What it includes

  • anomalyx setup: installs Python capture dependencies and attempts Npcap setup on Windows.
  • anomalyx agent: runs the endpoint capture/detection/enforcement agent.
  • anomalyx dashboard: runs the relay + monitoring dashboard.
  • anomalyx search-events: query local event logs by action/risk.
  • anomalyx search-enforcement: query enforcement actions by status/action/ip.
  • anomalyx unblock-ip: remove host firewall blocks for a remote IP.

Quick start

pip install anomalyx
anomalyx setup

Start dashboard:

anomalyx dashboard --host 0.0.0.0 --port 8600

relay-ip means the IP address of the machine where you started anomalyx dashboard.

Start agent on Ubuntu VM (recommended):

sudo anomalyx agent --agent-id ubuntu-vm-001 --relay-url http://<relay-ip>:8600 --interface eth0

Start agent on Windows VM (Administrator terminal):

anomalyx agent --agent-id win-vm-001 --relay-url http://<relay-ip>:8600

Open dashboard:

  • http://<relay-ip>:8600/

What to expect

  • Live events with action labels: allow, alert, temp_block_ip, block_ip.
  • Risk score and reason generated from fusion policy.
  • Enforcement status in event data (applied/skipped/failed) with diagnostics.
  • Staged escalation and repeat-safe enforcement to reduce false positives.
  • Allowlist support with controlled blocking rate limits.
  • Dashboard UI supports action/enforcement filters and critical traffic strip.
  • Landing page shows fleet-level alerts/temp-blocks/blocks per agent.
  • Dashboard supports admin-token protected unblock requests.

Baseline mode (recommended first days)

  • Default policy is tuned to prefer alert + temp_block_ip.
  • block_ip now requires stronger repeat evidence and higher risk.
  • Review enforcement log daily before expanding allowlist.

Daily review command:

anomalyx review-enforcement --log-path anomalyx-logs/enforcement_actions.log --top 20 --min-count 5
  • Local logs on agent host (default):
    • anomalyx-logs/agent_runtime.log
    • anomalyx-logs/agent_events.jsonl
    • anomalyx-logs/enforcement_actions.log

Notes

  • anomalyx setup uses winget/choco for automatic Npcap install on Windows when available.
  • If automatic Npcap installation is unavailable, install Npcap manually: https://npcap.com/#download.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

anomalyx-0.1.15.tar.gz (11.6 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

anomalyx-0.1.15-py3-none-any.whl (12.2 MB view details)

Uploaded Python 3

File details

Details for the file anomalyx-0.1.15.tar.gz.

File metadata

  • Download URL: anomalyx-0.1.15.tar.gz
  • Upload date:
  • Size: 11.6 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.0

File hashes

Hashes for anomalyx-0.1.15.tar.gz
Algorithm Hash digest
SHA256 ad937ea960a1a9446c5e9380d14367b09578a4d6523a21d22ac85459d33efd98
MD5 537fb17a83f05349c419574b0af67c4c
BLAKE2b-256 a09f7396c23dfc36ad02db40318a43cc18c2ba2b357337c1691fc4c2b2dd4cc2

See more details on using hashes here.

File details

Details for the file anomalyx-0.1.15-py3-none-any.whl.

File metadata

  • Download URL: anomalyx-0.1.15-py3-none-any.whl
  • Upload date:
  • Size: 12.2 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.10.0

File hashes

Hashes for anomalyx-0.1.15-py3-none-any.whl
Algorithm Hash digest
SHA256 e43365b9471bd3c6efb18b8e2e40346ae17b398791d07ffedc40815074460cc2
MD5 5981864ad7e41785eb6a68b71e915cd2
BLAKE2b-256 9f1abb63b99200c39cbb263e3da16f634015bde29b83aa3abc5f7e1699a96db9

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page