kaiiyer / UBALinks
UEBA Solution for Insider Security. This repo is archived. Thanks!
☆45Updated 5 years ago
Alternatives and similar repositories for UBA
Users that are interested in UBA are comparing it to the libraries listed below
Sorting:
- User and Entity Behavior Analytics by deep learning☆117Updated 4 years ago
- A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by D…☆455Updated last year
- ☆78Updated 7 years ago
- The implementation of the Seq2Seq model for web attack detection. The Seq2Seq model is usually used in Neural Machine Translation. The ma…☆156Updated 3 years ago
- Anomaly detection based on DNS traffic analysis☆54Updated 5 years ago
- ☆51Updated 7 years ago
- Analysis of HTTP traffic and detection of anomalous user behavior in allowed actions. UEBA system.☆24Updated 2 years ago
- Machine learning to classify Malicious (Spam)/Benign URL's☆133Updated 4 years ago
- Implementation realized for my master thesis on "Botnet detection in encrypted traffic - a machine learning approach"☆18Updated 6 years ago
- Repository of Bachelor's Major Project on Botnet Detection☆165Updated 7 years ago
- Machine learning algorithms applied on log analysis to detect intrusions and suspicious activities.☆159Updated this week
- Repository of creating different example suricata data sets☆36Updated 6 years ago
- Labeled DNS exfiltration datasets and algorithms of DNS tunneling detection☆29Updated 3 years ago
- Machine Learning WAF Based☆96Updated 4 years ago
- Machine Learning Based Botnet Detection is a tool to classify network traffic as being botnet affected or not based on the network traffi…☆67Updated 5 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆59Updated 4 years ago
- Towards Building an Intelligent Anti-Malware System: A Deep Learning Approach using Support Vector Machine for Malware Classification☆173Updated 2 years ago
- Detecting malicious URLs using Machine Learning☆30Updated 7 years ago
- Anomaly detection in network traffic and event logs using deep learning (w/ Pytorch)☆71Updated 6 years ago
- This is a paper list about Machine Learning for IDSes☆90Updated last year
- The project is to detect malware traffic in TLS flows using ML☆35Updated 5 years ago
- Machine Learning and Security | Using machine learning to detect malicious URLs☆272Updated 3 years ago
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Updated 8 years ago
- This program allow you to extract some features from pcap files.☆40Updated 2 years ago
- Identify malicious behavior and attacks using Machine Learning with Python☆49Updated 8 years ago
- Chrome extension for detecting phishing web sites☆253Updated 5 years ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Updated 4 years ago
- Extracting Attack Behavior from Threat Reports☆78Updated 2 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 5 years ago
- A Dataset for the task of Malicious URL Detection☆21Updated 7 years ago