Skip to main content

FlowMeter Datasets

FlowMeter uses takes packets as input, derives a rich set of features, constructs flows on the basis of these features and uses machine learning to classify the ensuing flows as malicious or benign.

FlowMeter can process live packets or can analyze offline packets.

The tests in the repo used the following sample packet datasets:

Benign Packets

wget https://deepfence-public.s3.amazonaws.com/pcap-datasets/benign_2017-05-02_kali-normal22.pcap

Malicious Packets

wget https://deepfence-public.s3.amazonaws.com/pcap-datasets/webgoat.pcap

Other Datasets

Additionally, one can also use sample data from various sources like the datasets mentioned below, or gather packet captures using PacketStreamer or other pcap tools.