kaiiyer / UBALinks
UEBA Solution for Insider Security. This repo is archived. Thanks!
☆45Updated 5 years ago
Alternatives and similar repositories for UBA
Users that are interested in UBA are comparing it to the libraries listed below
Sorting:
- User and Entity Behavior Analytics by deep learning☆115Updated 4 years ago
- Repository of Bachelor's Major Project on Botnet Detection☆163Updated 7 years ago
- Anomaly detection based on DNS traffic analysis☆54Updated 5 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆449Updated last year
- Machine learning to classify Malicious (Spam)/Benign URL's☆133Updated 4 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆24Updated 2 years ago
- ☆52Updated 7 years ago
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆29Updated 2 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Updated 3 years ago
- ☆76Updated 7 years ago
- Detecting malicious URLs using Machine Learning☆30Updated 6 years ago
- A Dataset for the task of Malicious URL Detection☆21Updated 7 years ago
- This is a paper list about Machine Learning for IDSes☆90Updated last year
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆158Updated this week
- Machine Learning Models to Detect and Classify Malicious URLs☆53Updated 2 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆68Updated 4 years ago
- VGG-19 deep learning model trained using ISCX 2012 IDS Dataset☆143Updated 6 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Updated 4 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Updated 6 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆48Updated 8 years ago
- Extracting Attack Behavior from Threat Reports☆77Updated 2 years ago
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆75Updated last year
- This program allow you to extract some features from pcap files.☆40Updated 2 years ago
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- Machine Learning WAF Based☆94Updated 4 years ago
- A collection of resources for security data☆41Updated 7 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆272Updated 3 years ago
- Chrome extension for detecting phishing web sites☆254Updated 4 years ago
- DGA Detection with ML and DL☆51Updated 6 years ago
- Mastering Machine Learning for Penetration Testing, published by Packt☆369Updated 2 years ago