mehak6569/TOR-NonTOR

Identifying TOR traffic from the Internet traffic

20
/ 100
Experimental

This project helps network security analysts and law enforcement trace potential illicit activities by identifying TOR network traffic within general internet data. It takes raw network traffic data, like that captured by Wireshark, and classifies it as either belonging to the anonymous TOR network or standard internet use. The primary users are cybersecurity professionals, network administrators, and investigators focused on network forensics and threat detection.

No commits in the last 6 months.

Use this if you need to reliably detect and differentiate TOR traffic from normal network activity for security monitoring or investigative purposes.

Not ideal if you are looking for a tool to identify specific users or content within TOR, as this focuses solely on classifying the traffic itself.

network-security cybercrime-investigation threat-detection network-forensics intrusion-detection
Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 4 / 25
Maturity 16 / 25
Community 0 / 25

How are scores calculated?

Stars

7

Forks

Language

Jupyter Notebook

License

MIT

Last pushed

May 01, 2024

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/mehak6569/TOR-NonTOR"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.