Skip to content

heiFIP: A tool to convert network traffic into images for ML use cases

License

Notifications You must be signed in to change notification settings

stefanDeveloper/heiFIP

Repository files navigation

heiFIP Logo


heiFIP stands for Heidelberg Flow Image Processor. It is a tool designed to extract essential parts of packets and convert them into images for deep learning purposes. heiFIP supports different formats and orientations. Currently, we only support offline network data analysis. However, we plan to adapt our library to support online network data too to enable live-probing of models.

Live Notebook live notebook
Latest Release latest release
Supported Versions python3 pypy3
Project License License
Citation Citation
Continuous Integration Linux WorkFlows MacOS WorkFlows Windows WorkFlows

Table of Contents

Motivation

The idea to create heiFIP came from working with Deep Learning approaches to classify malware traffic on images. Many papers use image representation of network traffic, but reproducing their results was quite cumbersome. As a result, we found that there is currently no official library that supports reproducible images of network traffic. For this reason, we developed heiFIP to easily create images of network traffic and reproduce ML/DL results. Researchers can use this library as a baseline for their work to enable other researchers to easily recreate their findings.

Main Features

  • Different Images: Currently, we support plain packet to byte representation, and flow to byte representation with one channel each. An image is created with same width and height for a quadratic representation.
    • Flow Images converts a set of packets into an image. It supports the following modifications:
      • Max images dimension allows you to specify the maximum image dimension. If the packet is larger than the specified size, it will cut the remaining pixel.
      • Min image dimesion allows you to specify the minimum image dimension. If the packet is smaller than the specified size, it fills the remaining pixel with 0.
      • Remove duplicates allows you to automatically remove same traffic.
      • Append each flow to each other or write each packet to a new row.
      • Tiled each flow is tiled into a square image representation.
      • Min packets per flow allows you to specify the minimum number of packets per flow. If the total number of packets is too small, no image will be created.
      • Max packets per flow allows you to specify the maximum number of packets per flow. If the total number of packets is too great, the remaining images are discarded.
    • Packet Image converts a single packet into an image.
    • Markov Transition Matrix Image: converts a packet or a flow into a Markov representation.
  • Header processing allows you to customize header fields of different protocols. It aims to remove biasing fields. For more details look into header.py
  • Remove Payload options allows you to only work on header data.
  • Fast and flexible: We rely on Scapy for our sniffing and header processing. Image preparation is based on raw bytes.
  • Machine learning orientation: heiFIP aims to make Deep Learning approaches using network data as images reproducible and deployable. Using heiFIP as a common framework enables researches to test and verify their models.

Examples

Image Type Description Example
Packet Converts a single packet into a square image. Size depends on the total length SMB Connection
Flow Converts a flow packet into a square image SMB Connection
Markov Transition Matrix Packet Converts a packet into a Markov Transition Matrix. Size is fixed to 16x16. SMB Connection
Markov Transition Matrix Flow Converts a flow into a Markov Transition Matrix. It squares the image based on the number of packets SMB Connection

Getting Started

Install our package using PyPi

pip install heifip

Now, you can use the integrate CLI:

> fip
Usage: fip [OPTIONS] COMMAND [ARGS]...

Options:
  --version   Show the version and exit.
  -h, --help  Show this message and exit.

Commands:
  extract

To extract images from PCAPs, we currently split the command into flow and packet:

> fip extract
Starting FlowImageProcessor CLI
Usage: fip extract [OPTIONS] COMMAND [ARGS]...

Options:
  -h, --help  Show this message and exit.

Commands:
  flow
  packet

# Show help information
> fip extract [flow/packet]-h
Starting FlowImageProcessor CLI
Usage: fip extract flow [OPTIONS]

Options:
  -w, --write PATH            Destination file path, stores result  [required]
  -r, --read PATH             [required]
  -t, --threads INTEGER       Number of parallel threads that can be used
                              [default: 4]
  --preprocess [NONE|HEADER]  Applies a preprocessing to the input data: none:
                              No preprocessing payload: Only payload data is
                              used header: Preprocesses headers
                              (DNS,HTTP,IP,IPv6,TCP,UDP supported) to remove
                              some biasing data  [default: NONE]
  --min_im_dim INTEGER        Minimum dim ouput images need to have, 0=No
                              minimum dim  [default: 0]
  --max_im_dim INTEGER        Maximum dim ouput images can have, 0=No maximum
                              dim  [default: 0]
  --remove_duplicates         Within a single output folder belonging to a
                              single input folder no duplicate images will be
                              produced if two inputs lead to the same image
  --min_packets INTEGER       Minimum packets that a FlowImage needs to have,
                              0=No minimum packets per flow  [default: 0]
  --max_packets INTEGER       Minimum packets that a FlowImage needs to have,
                              0=No minimum packets per flow  [default: 0]
  --append
  --tiled
  --width INTEGER             [default: 128]
  -h, --help                  Show this message and exit.

> fip extract flow -r /PATH/PCAPs -w /PATH/IMAGES

Import FIPExtractor to run it inside your program:

extractor = FIPExtractor()
img = extractor.create_image('./test/pcaps/dns/dns-binds.pcap')
extractor.save_image(img, './test/pcaps/dns/dns-binds.pcap')

Building from source

Simply run:

pip install .

Publications that use heiFIP

  • [A Generalizable Approach for Network Flow Image Representation for Deep Learning] - CSNet 23
  • [Explainable artificial intelligence for improving a session-based malware traffic classification with deep learning] - SSCI 23

Credits

NFStream for the inspiration of the README.md and workflow testing.

Authors

The following people contributed to heiFIP:

License

This project is licensed under the EUPL-1.2 License - see the License file for details