RSS 5 projects tagged "Network Analysis"

Download Website Updated 14 Jan 2013 HOMER SIP Capture

Screenshot
Pop 23.75
Vit 21.41

HOMER is a robust, carrier-grade, scalable SIP capturing system and monitoring application with hEP, IP Proto4 (IPIP) encapsulation, and port mirroring/monitoring support right out of the box, ready to process and store large amounts of signaling with instant searches, end-to-end analysis, and drill-down capabilities for ITSPs, VoIP providers, and trunk suppliers using SIP signaling.

Download Website Updated 18 Feb 2012 Multi Threaded TCP Port Scanner

Screenshot
Pop 95.15
Vit 3.18

Multi Threaded TCP Port Scanner allows you to scan 65535 TCP ports on an IP address. You can specify how many threads to run and the timeout. Furthermore, it will tell you the MAC address of the target and the services that are running. You can scan IP addresses on your network and find out which open ports you have.

Download Website Updated 15 Dec 2011 mcl-edge

Screenshot
Pop 118.56
Vit 6.31

MCL-edge is an integrated command-line driven workbench for large scale network analysis. It includes programs for the computation of shortest paths, diameter, clustering coefficient, betweenness centrality, and network shuffles. A module for loading and analyzing gene expression data as a network is provided. The MCL algorithm is a fast and highly scalable cluster algorithm for networks based on stochastic flow. The flow process employed by the algorithm is mathematically sound and intrinsically tied to cluster structure, which is revealed as the imprint left by the process. The threaded implementation has handled networks with millions of nodes within hours and is widely used in the fields of bioinformatics, graph clustering, and network analysis.

No download Website Updated 03 Mar 2011 RedWolf Security Threat Generator

Screenshot
Pop 141.70
Vit 2.47

RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.

Download Website Updated 25 Oct 2010 gbRRDGraphix

Screenshot
Pop 71.11
Vit 2.20

gbRRDGraphix is a graphical user interface that allows one to use RRDTool commands and "flow-tools" Netflow utilities easily. The project includes a scheduler to update the RRDTool database and a complete Web site to display all RRDtool graphics.

Screenshot

Project Spotlight

Wandora

A Topic Map editor application.

Screenshot

Project Spotlight

CorneliOS

A virtual Web OS.