kaiiyer / UBA
UEBA Solution for Insider Security. This repo is archived. Thanks!
☆44Updated 5 years ago
Alternatives and similar repositories for UBA:
Users that are interested in UBA are comparing it to the libraries listed below
- User and Entity Behavior Analytics by deep learning☆108Updated 4 years ago
- Anomaly detection based on DNS traffic analysis☆52Updated 4 years ago
- ☆74Updated 7 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆421Updated last year
- Machine Learning WAF Based☆94Updated 4 years ago
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆28Updated 2 years ago
- This is a paper list about Machine Learning for IDSes☆90Updated 7 months ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 3 years ago
- SSH traffic analysis☆23Updated 6 years ago
- Extracting Attack Behavior from Threat Reports☆76Updated last year
- Repository of creating different example suricata data sets☆34Updated 6 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆77Updated 8 months ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆34Updated last year
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆140Updated 6 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Updated 3 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆48Updated 8 years ago
- SecureBERT is a domain-specific language model to represent cybersecurity textual data.☆88Updated 9 months ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆128Updated 3 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 7 years ago
- A method for grouping, clustering, and merging semi-structured alerts☆23Updated 5 months ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Updated 3 years ago
- DNS tunneling over DoH Dataset☆11Updated 2 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆22Updated 2 years ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 9 months ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- CTI database generator and public dataset☆21Updated 5 years ago
- Shell Language Processing (SLP). Pre-processing of sh/bash/zsh/.. commands for Machine Learning models.☆36Updated 7 months ago
- This repository holds the dataset used to conduct experiments for the "Cyberthreat Detection from Twitter using Deep Neural Networks" acc…☆31Updated 4 years ago
- [TDSC 2021] IntruSion alert-driven Attack Graph Extractor. https://ieeexplore.ieee.org/document/9557854☆35Updated 9 months ago
- ☆22Updated 3 years ago