kaiiyer / UBA
UEBA Solution for Insider Security. This repo is archived. Thanks!
☆44Updated 5 years ago
Alternatives and similar repositories for UBA
Users that are interested in UBA are comparing it to the libraries listed below
Sorting:
- User and Entity Behavior Analytics by deep learning☆110Updated 4 years ago
- ☆75Updated 7 years ago
- Anomaly detection based on DNS traffic analysis☆53Updated 4 years ago
- Machine Learning WAF Based☆94Updated 4 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆427Updated last year
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆28Updated 2 years ago
- DNS tunneling over DoH Dataset☆11Updated 2 years ago
- Detecting malicious URLs using Machine Learning☆30Updated 6 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆55Updated 4 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆140Updated 6 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆22Updated 2 years ago
- SSH traffic analysis☆23Updated 6 years ago
- Repository of Bachelor's Major Project on Botnet Detection☆160Updated 6 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Updated 6 years ago
- A Dataset for the task of Malicious URL Detection☆21Updated 7 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Updated 3 years ago
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆64Updated 2 years ago
- This is a paper list about Machine Learning for IDSes☆89Updated 8 months ago
- Code to go with the paper "Real-Time Detection of Dictionary DGA Network Traffic using Deep Learning"☆18Updated 4 years ago
- Building Intrusion Detection System for Network Security Using the KD99 Data Set☆11Updated 9 years ago
- ☆12Updated last year
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated 2 years ago
- The Domain Name System is a fundamental component of the internet since it maps the easy-to-remember domain names to IP addresses. Theref…☆16Updated 4 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆68Updated 4 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆129Updated 3 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆48Updated 8 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆78Updated 9 months ago
- This program allow you to extract some features from pcap files.☆38Updated 2 years ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆49Updated 4 years ago