Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
-
Updated
Dec 13, 2025 - Go
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.
Advanced network traffic forecasting framework using SARIMA time series models on CESNET-TimeSeries-2023-2024 dataset. Includes automated retraining, comprehensive evaluation metrics (RMSE, SMAPE, R²), and production-ready HPC batch processing scripts.
ML pipelines for cybersecurity: packet flow feature engineering, automated LightGBM tuning, HTTP malware detection
Materials about Encrypted Traffic Analysis
Flonwix is a graphical network traffic analyzer for Linux-based systems that relies on ptcpdump
NexoOps is an Intelligent Network Management System which summarizes log files, classify alerts and uses a chatbot to show real time network traffic through commands
SaaS Zero - Network Traffic Monitor Professional network traffic monitoring and security analysis platform
A comprehensive toolkit for applying Machine Learning and Data-Driven approaches to digital forensics and cyber security investigations. Features network traffic analysis, memory forensics integration with Volatility 3, and CASE-compliant data handling.
In this course, learn cybersecurity analysis using Wireshark and Tshark. Master packet capture, filtering, protocol analysis, and automation for effective network security monitoring.
Intrusion Detection System
This project focused on capturing, analyzing, and investigating network traffic to identify communication patterns, monitor data flows, and detect potential anomalies. Using Wireshark, I examined traffic between devices, mapped source and destination IPs, and studied key protocols such as TCP, DHCP, and ICMPv6 to understand network behavior.
Intrusion Detection with ML: CICIDS-2017 → Preprocessing → XGBoost → PCA → Real-Time Power BI Dashboards
An interactive dashboard for network security analysis and cyber-attack visualization using the UNSW-NB15 dataset. Built with Python, Streamlit & Altair.
A model trained for network traffic prediction. problem and data provided by ETRI(Electronics and Telecommunications Research Institute), Korea, Republic of.
# Chronicle-Sniffer Chronicle-Sniffer is a tool designed to capture and analyze network traffic efficiently. It integrates seamlessly with GCP, Terraform, and Docker, providing a robust solution for developers. 🐙✨
Python pipeline for analyzing firewall/IDS CSV logs: core traffic stats, sublinear-space estimators (distinct IPs, heavy hitters, Bloom filters), and anomaly/threat detection. Compares approximate vs exact baselines with target ≤10% error, plus risk reporting and visuals.
Add a description, image, and links to the network-traffic-analysis topic page so that developers can more easily learn about it.
To associate your repository with the network-traffic-analysis topic, visit your repo's landing page and select "manage topics."