UEBA Solution for Insider Security. This repo is archived. Thanks!
☆46Feb 28, 2020Updated 6 years ago
Alternatives and similar repositories for UBA
Users that are interested in UBA are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- User and Entity Behavior Analytics by deep learning☆120Feb 26, 2021Updated 5 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆478Apr 24, 2026Updated 2 weeks ago
- A curated list of resources for Cyber Professionals☆16Dec 27, 2020Updated 5 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆25Feb 15, 2023Updated 3 years ago
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Sample data generator for the Splunk for Palo Alto Networks app.☆11Sep 25, 2016Updated 9 years ago
- The project “Behavioral Based Insider Threat Detection” leverages Deep learning to identify insider threats through user behavior and acc…☆11Sep 12, 2023Updated 2 years ago
- Springboot+Mybatis+Mysql 实现的成绩管理系统。☆10Nov 1, 2020Updated 5 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆39Apr 19, 2025Updated last year
- Anomaly detection is a critical step towards building a secure and trustworthy system. The primary purpose of a system log is to record s…☆14Dec 7, 2021Updated 4 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Jul 10, 2017Updated 8 years ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakag…☆11Dec 4, 2022Updated 3 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- Kubox, is a small (<600bytes gzip) state manager, such as Redux, Mobx or another library.☆10Aug 29, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Web Applicaiton Firewall Implementation using Deep Learning☆16Feb 3, 2023Updated 3 years ago
- Insider threat detection via bert☆23Jan 13, 2022Updated 4 years ago
- Training an LSTM-based autoencoder to detect anomalies in the KDD99 network traffic dataset.☆15Oct 17, 2020Updated 5 years ago
- A comprehensive collection of Data Science and Artificial Intelligence projects, including hands-on examples, course materials, and solut…☆21Jul 24, 2025Updated 9 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Phishing URL Detection with Deep Learning☆14Feb 28, 2024Updated 2 years ago
- ☆12May 20, 2012Updated 13 years ago
- Avoid malicious payloads in your webapp with machine learning!☆21Feb 6, 2023Updated 3 years ago
- Example of REST API along with WebSocket endpoint using Undertow, Weld, Jersey and JSR 356.☆19Jul 20, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scala solutions for hackerrank☆11Nov 20, 2016Updated 9 years ago
- ☆12Mar 6, 2020Updated 6 years ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆13May 27, 2020Updated 5 years ago
- Code repository supporting the medium blog☆12Feb 22, 2020Updated 6 years ago
- An example Python C extension module☆15Apr 5, 2020Updated 6 years ago
- NLP Resources for Indian Languages☆10Nov 9, 2020Updated 5 years ago
- ☆20May 12, 2021Updated 4 years ago
- Automated threat intelligence collection with McAfee ATD, OpenDXL and MISP☆22Feb 21, 2020Updated 6 years ago
- The objective of the project is to run AI on the edge on CCTV camera at home looking over the driveway and the Android application can sh…☆10Mar 15, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Build an RNN in Keras used for predicting stock prices.☆10May 8, 2018Updated 8 years ago
- ☆14Dec 8, 2022Updated 3 years ago
- Cybersecurity demo for Neo4j's Connections: Graphs in Cybersecurity 2021☆14May 17, 2022Updated 3 years ago
- 基于springboot的学生成绩管理系统☆18Jun 21, 2022Updated 3 years ago
- 2020 西湖论剑恶意流量检测实现代码☆12Dec 20, 2022Updated 3 years ago
- Repository with research related to Android☆13Jul 17, 2018Updated 7 years ago
- ⚙️ Converts NDJson format data into CSV☆21Dec 15, 2024Updated last year