Internode Nodemap is a network visualization tool. Using SNMP, it gathers a periodic snapshot of the current state of the network. Then, under instructions from its config file, it plots a series of "maps" of the network over the top of GIF images in the Web server's document root, using color and HTML CSS to indicate potential performance or reliability problems. The maps are hierarchical "drill-down" views of the network. The top-level map is a summary which can be clicked on to reveal specific details; these more specific maps can also have additional maps nested within.
Tea4CUPS is similar in functionality to the *nix command "tee", but in the form of a CUPS (Common UNIX Printing System) backend. Tea4CUPS captures a print job's data in their final form while they are being sent to a printer (more precisely, to a CUPS backend), and at the same time allows you to dispatch these data to any number of commands.
NEye is a Netflow V5 collector. It logs incoming Netflow V5 data to ASCII, MySQL, or SQLite databases, and it makes full use of POSIX threads if available. It works on most major platforms (Linux, Solaris, AIX, Irix, HP/UX, Mac OS X, Digital Unix, etc.) and older ones too (Ultrix, Nextstep, etc.).
fupids2 is a so-called human oriented IDS based on the FUPIDS project. fupids2 calculates an attacker level for every user on all Unix/Linux/BSD systems in the network. It looks at the behavior of the user (the programs the user uses, the daytime the user is active, the building and room the user uses, the part of the room in which the user sits, and so on) and reports if the user engages in behavior that is unusual for that person. This method can often detect accounts overtaken by attackers.
ProM is an extensible framework that supports a wide variety of process mining techniques in the form of plug-ins. Plug-ins currently support the import of and the conversion between several process modelling languages, including Petri nets (PNML, TPN), EPCs/EPKs (Aris graph format, EPML), and YAWL. Mining, analysis, and log filtering plug-ins are also available.
GlowWorm FW Lite is a network security and monitoring application that allows the user to define a set of rules defining acceptable network behaviour on a per-address, port, and application basis. An authorization dialog alerts you when an application tries to perform an unauthorized operation on the network.
Path Analyzer Pro integrates advanced traceroute software (based on the open-source tool LFT) with performance measurements, DNS, whois, and specialized network resolution to help investigate network issues. It also supports geolocation, and can plot network paths on a map. People use it to research IP addresses, email addresses, and network paths, to graph protocol latency, jitter, and other factors, and to locate firewalls and other filters that may be impacting your connections.