shramos / pcap-splitter
Pcap-splitter allows you to split a pcap file into subsets of pcap files based on sessions, flows, ip addresses, number of bytes, number of network packets...
☆65Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for pcap-splitter
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆103Updated 2 years ago
- A Zeek script to generate features based on timing, volume and metadata for traffic classification.☆53Updated 4 years ago
- A completely automated anomaly detector Zeek network flows files (conn.log).☆74Updated 3 months ago
- Use PyShark and scapy to read fields from a pcap file and populate a CSV☆55Updated 4 years ago
- A simple utility to classify packets into flows. It's so simple that only one task is aimed to finish. For Deep Packet Inspection or flo…☆166Updated last year
- DoHlyzer is a DNS over HTTPS (DoH) traffic flow generator and analyzer for anomaly detection and characterization.☆58Updated last year
- This Network Intrusion Detection System (IDS) is network-based, and it will receive suspicious packet capture files from a network monito…☆14Updated last year
- ISCXFlowMeter is an Ethernet traffic flow generator and analyzer for anomaly detection which has been used in different network security …☆69Updated 9 months ago
- Using machine learning to detect malware in encrypted TLS traffic metadata☆17Updated 3 years ago
- nPrintML creates and runs full ML-based traffic analysis pipelines using nPrint and AutoML.☆48Updated 9 months ago
- 多进程读取pcap,基于五元组分流并提取流量特征。结果输出为csv文件,用于机器学习中对加密流量进行分类☆78Updated 2 years ago
- These scripts conduct TCPDUMP in harmony with CICFlowMeter to operation real-time traffic capturing and converting in csv file.☆48Updated 4 years ago
- Coburg Intrusion Detection Data Sets☆48Updated 7 years ago
- Traffic analysis for Tor-based malware detection and classification☆38Updated last year
- This program allow you to extract some features from pcap files.☆38Updated last year
- CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) is a network traffic Bi-flow generator and analyzer for anomaly detection that has be…☆161Updated last year
- Use deep learning to classify the malicious traffic, and use TensorFlow2.0 to carry out it.☆32Updated 4 years ago
- Official ID2T repository. ID2T creates labeled IT network datasets that contain user defined synthetic attacks.☆58Updated last year
- ICS Cybersecurity PCAP respository☆49Updated 5 years ago
- The project is to detect malware traffic in TLS flows using ML☆32Updated 4 years ago
- DGA Detection with ML and DL☆47Updated 5 years ago
- Leveraging machine learning to detect TLS based malware in encrypted traffic without decryption☆39Updated 4 years ago
- Pcap Converter: convert pcap to text or flows.☆49Updated 4 years ago
- Repository of creating different example suricata data sets☆32Updated 5 years ago
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT☆41Updated 5 years ago
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆66Updated 3 years ago
- calculate flow information from PCAP and extract tcp streams☆69Updated 4 months ago
- SSH traffic analysis☆23Updated 5 years ago
- A set of methods to enable traffic classification using randomness tests. We also add an automated database creation algorithm.☆16Updated 3 years ago
- Traffic dataset USTC-TFC2016☆113Updated 5 years ago