Skip to main content

Use Your Own Data

To run inference on your dataset, please ensure the following features are listed

FeatureDescription
timestampString datetime when flow started such as "2017-03-07 08:55:58"
flow_durThe duration of the flow in seconds
src_ipA unique identifier of the source device initiating the flow
dest_ipA unique identifier of the destination device receiving the flow
src_portSource port
dest_portDestination port
fwd_bytesTotal number of payload bytes, sent from source to destination
bwd_bytesTotal number of payload bytes, sent from destination to source
total_fwd_pktsTotal number of packets sent from source to destination
total_bwd_pktsTotal number of packets sent from destination to source
labelRequired if fine-tuning. Indicates if flow is suspicious marked as 1 or if normal marked as 0

The above features can be exported from network monitoring tools such as NetFlow, Wireshark, Zeek, SolarWinds or AWS/GCP Flow logs

sample input data

sample input data

Adding a uid-device mapping

If the device type of the uids/IPs provided in the 'src_ip' or 'dest_ip' is known, it can be categorized into one of the following:

Device TypeDescription
workstationendpoint devices used by individuals such as desktop or laptops
webserverservers that hosts and delivers web content or application via HTTP/HTTPS
ubuntulinux based servers or other servers in organization
firewallnetwork security devices
dnsdomain name servers

Providing a uid to device mapping can help enhance the resulting output by providing more information into how certain device types operate within your network

For advanced operations it may be useful to use Tempo itself to resolve entities; if you are interested in this and other approaches to improving the accuracy and usefulness of Tempo, please reach out.

sample uid-device mapping

{
"192.x.x.3": "dns",
"192.x.x.50": "webserver",
"205.x.x.68": "webserver",
"192.x.x.51": "ubuntu",
"205.x.x.66": "ubuntu",
"192.x.x.17": "firewall",
"192.x.x.16": "firewall",
"192.x.x.9": "workstation",
"192.x.x.5": "workstation",
"192.x.x.8": "workstation",
"192.x.x.14": "workstation",
"195.x.x.55": "dns",
"68810583-72a000813f68": "dns",
"cff90ebf-cd24": "webserver"
}

Understanding the result

FeatureDescription
start_timeThe earliest timestamp when the flow started between the src_ip and dest_ip.
end_timeThe timestamp of the last flow sent from the src_ip to the dest_ip.
src_ipA unique identifier for the source device initiating the flow.
dest_ipA unique identifier for the destination device receiving the flow.
num_connectionThe total number of flows or data points sent between the src_ip and dest_ip.
src_portThe port number used by the source device.
dest_portThe port number used by the destination device.
src_deviceThe device type assigned to the src_ip in the UID-device mapping, or unknown if not provided.
dest_deviceThe device type assigned to the dest_ip in the UID-device mapping, or unknown if not provided.
classificationThe model's result, indicating whether the flow is marked as 'MALICIOUS' or 'BENIGN'.