
Netcap
#Network & Cloud#Network Security
Normalize, index, enrich, and visualize network capture data using Potiron.
The Netcap (NETwork CAPture) Framework: A Streamlined Approach to Network Packet Conversion
The Netcap (NETwork CAPture) framework effectively transforms a stream of network packets into platform-neutral, type-safe structured audit records. These records accurately represent specific protocols or custom abstractions.
Storing and Utilizing Audit Records
These audit records can be saved on disk or transmitted over the network, making them an excellent data source for machine learning algorithms. However, parsing untrusted input can pose risks, and network data may be malicious. Therefore, a programming language that offers a garbage-collected, memory-safe runtime is used for the implementation.
It was developed for a series of experiments
This work was developed for a series of experiments conducted as part of a bachelor thesis focused on the implementation and evaluation of secure and scalable anomaly-based network intrusion detection. Additionally, slides from the presentation at the Leibniz Supercomputing Centre of the Bavarian Academy of Sciences and Humanities can be found on ResearchGate.
The project secured 2nd Place at Kaspersky Labs SecurIT Cup 2018
The project secured 2nd Place at the Kaspersky Labs SecurIT Cup 2018 held in Budapest. Netcap utilizes Google's Protocol Buffers to encode its output, enabling access across a diverse range of programming languages. Alternatively, the output can be generated as comma-separated values, which is a widely used input format for data analysis tools and systems.
Other AI Tools

mass-s3-bucket-tester
Cloud runtime security platform that uses eBPF technology to monitor cloud infrastructure, detect anomalies, and identify potential security threats in real-time.
Details
Visit site

MKIT - Managed Kubernetes Inspection Tool
A CLI utility that makes it easier to switch between different AWS roles
Details
Visit site

minikube
An open-source framework for testing and validating the security of AWS services and resources.
Details
Visit site

Microsoft Defender for Cloud
Learn how to secure applications in Kubernetes Engine by granting varying levels of privilege based on requirements.
Details
Visit site

Metabadger
Find exposed AWS cloud assets that you did not know you had.
Details
Visit site

Linux Containers in 500 Lines of Code
Weave Scope automatically generates a map of your application for troubleshooting and monitoring Docker & Kubernetes.
Details
Visit site