CollinsChepkwony / BEHAVIORAL-BASED-INSIDER-THREAT-DETECTION-USING-DEEP-LEARNINGView external linksLinks
The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and access analysis, achieving 100% accuracy with CMU CERT r5.2 data. Key terms: Insider threat, Deep Learning, User behavior and Information security.
☆11Sep 12, 2023Updated 2 years ago
Alternatives and similar repositories for BEHAVIORAL-BASED-INSIDER-THREAT-DETECTION-USING-DEEP-LEARNING
Users that are interested in BEHAVIORAL-BASED-INSIDER-THREAT-DETECTION-USING-DEEP-LEARNING are comparing it to the libraries listed below
Sorting:
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Dec 4, 2022Updated 3 years ago
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paper☆13Aug 30, 2022Updated 3 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- 此仓库代码为本人参加的CCF-BDCI-2022 赛道:Web攻击检测与分类识别 (多分类任务),比赛rank-23。队员:Furen Xu☆16Feb 6, 2023Updated 3 years ago
- ☆21May 19, 2016Updated 9 years ago
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise☆29Nov 19, 2021Updated 4 years ago
- User and Entity Behavior Analytics by deep learning☆120Feb 26, 2021Updated 4 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- [TKDE] This repository is the official implementation of the TKDE 2025 "Fuzzy Granule Density-Based Outlier Detection with Multi-Scale Gr…☆16Dec 20, 2025Updated last month
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Alternative password shadowing scheme☆10Dec 1, 2025Updated 2 months ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- ☆14Feb 12, 2024Updated 2 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆12Jun 24, 2021Updated 4 years ago
- 基于字节码的图融合的智能合约漏洞检测☆13Apr 23, 2024Updated last year
- Yet another fseventsd parser for macOS forensics☆11Jul 20, 2024Updated last year
- ☆17Jan 6, 2025Updated last year
- angular5+ant design+ng-alain校园网入侵检测系统☆11Jun 2, 2022Updated 3 years ago
- 华为认证考试题库☆10Aug 29, 2018Updated 7 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- UEBA Solution for Insider Security. This repo is archived. Thanks!☆46Feb 28, 2020Updated 5 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated 10 months ago
- Crawling Papers in S&P/CCS/USENIX Security/NDSS according to keywords.☆13May 12, 2025Updated 9 months ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- CSV Manager for AWS Security Hub exports SecurityHub findings to a CSV file and allows you to mass-update SecurityHub findings by modifyi…☆17Jul 23, 2025Updated 6 months ago