mehak6569/TOR-NonTOR
Identifying TOR traffic from the Internet traffic
This project helps network security analysts and law enforcement trace potential illicit activities by identifying TOR network traffic within general internet data. It takes raw network traffic data, like that captured by Wireshark, and classifies it as either belonging to the anonymous TOR network or standard internet use. The primary users are cybersecurity professionals, network administrators, and investigators focused on network forensics and threat detection.
No commits in the last 6 months.
Use this if you need to reliably detect and differentiate TOR traffic from normal network activity for security monitoring or investigative purposes.
Not ideal if you are looking for a tool to identify specific users or content within TOR, as this focuses solely on classifying the traffic itself.
Stars
7
Forks
—
Language
Jupyter Notebook
License
MIT
Category
Last pushed
May 01, 2024
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/mehak6569/TOR-NonTOR"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
GACWR/OpenUBA
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for...
nfstream/nfstream
NFStream: a Flexible Network Data Analysis Framework.
echowei/DeepTraffic
Deep Learning models for network traffic classification
faucetsdn/poseidon
Poseidon is a python-based application that leverages software defined networks (SDN) to acquire...
CESNET/cesnet-datazoo
CESNET DataZoo: A toolset for large network traffic datasets