Zeek Analysis Tools (ZAT) is a Python package designed for processing and analyzing Zeek network security monitoring data. The tool integrates with popular data science libraries including Pandas, scikit-learn, Kafka, and Spark to enable comprehensive network traffic analysis. ZAT provides multiple installation options through pip, including a basic installation, PySpark integration for distributed processing, and a comprehensive package with additional libraries like PyArrow, YARA-Python, and TLDExtract. The tool supports various data processing workflows from AWS data processing to machine learning modeling. Key features include faster and smaller Pandas DataFrames for handling large log files, improved DataFrame to matrix conversion capabilities, and scalable conversion from Zeek logs to Parquet format. The tool offers enhanced Spark DataFrame functionality and updated analysis notebooks for streamlined workflows. ZAT addresses the challenge of offloading complex analytical tasks from Zeek itself, enabling more efficient processing of high-volume network traffic data. The tool converts Zeek JSON logs to DataFrame format and provides enhanced data analysis capabilities for network security monitoring and threat detection workflows.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A free, open-source network protocol analyzer for capturing and displaying packet-level data.
Snort is an open source intrusion prevention system that uses rules to detect and prevent malicious network activity.
WiGLE.net is a platform that collects and provides data on WiFi networks and cell towers, with over 1.3 billion networks collected.
NordVPN is a commercial VPN service that encrypts internet connections and hides IP addresses through a global network of servers, featuring integrated threat protection and multi-device support.
A Bluetooth 5 and 4.x sniffer using TI CC1352/CC26x2 hardware with advanced features and Python-based host-side software.
A suite for man in the middle attacks, featuring sniffing of live connections, content filtering, and protocol dissection.
A Linux command-line tool that allows you to kill in-progress TCP connections based on a filter expression, useful for libnids-based applications that require a full TCP 3-way handshake for TCB creation.
A blog sharing packet capture files and malware samples for training and analysis, with archived posts and traffic analysis exercises.