FlowMeter Datasets
FlowMeter uses takes packets as input, derives a rich set of features, constructs flows on the basis of these features and uses machine learning to classify the ensuing flows as malicious or benign.
FlowMeter can process live packets or can analyze offline packets.
The tests in the repo used the following sample packet datasets:
Benign Packets
wget https://deepfence-public.s3.amazonaws.com/pcap-datasets/benign_2017-05-02_kali-normal22.pcap
Malicious Packets
wget https://deepfence-public.s3.amazonaws.com/pcap-datasets/webgoat.pcap
Other Datasets
Additionally, one can also use sample data from various sources like the datasets mentioned below, or gather packet captures using PacketStreamer or other pcap tools.