01Detection of suspicious patterns like port scanning and beaconing
02Structured reporting of network flow summaries and threat indicators
03Advanced DNS anomaly detection for identifying tunneling attempts
04Extraction of network IOCs including IPs, domains, and HTTP URLs
054,121 GitHub stars
06Automated protocol hierarchy and conversation statistics extraction