Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Oct 8, 2019
So you collect about a Gigabyte of traffic metadata each hour and want to filter out anomalies, such as a spike in TCP RST or a host, that is surprisingly chatty with foreign hosts. A simple yet relatively performant approach is to use Python and the DPKT library. This will be a quick start tutorial and some experience with using it.