Find a file
2020-07-27 13:05:06 +02:00
.github/workflows Adds CIFuzz to check PRs 2020-04-18 10:50:56 +02:00
.lgtm/cpp-queries ql query to identify suspicious use of network sourced integers 2020-04-02 17:14:49 -04:00
doc Guide update 2020-07-09 15:37:02 +02:00
example Fixed bin similarity 2020-07-24 01:30:58 +02:00
fuzz Removed csv_fp as external symbol. Instead passing csv_fp through as argument. 2020-07-08 23:21:35 +02:00
m4 Allow -fsanitize for LLVM as well as for GCC. 2020-06-23 00:22:33 +02:00
packages Added missing RPM files 2020-01-06 18:20:52 +01:00
python added modified risks 2020-07-22 12:41:59 +02:00
src Added NDPI_SMB_INSECURE_VERSION for detecting insecure SMB versions (e.g. v1) 2020-07-27 13:05:06 +02:00
tests Added NDPI_SMB_INSECURE_VERSION for detecting insecure SMB versions (e.g. v1) 2020-07-27 13:05:06 +02:00
utils Added bootstrap ethereum nodes 2020-01-08 22:44:30 +01:00
wireshark added shell script to download wireshark fuzzing traces, can be used in combination with ./tests/do.sh 2020-07-02 20:22:58 +02:00
.appveyor.yml Switch to dev branch. 2019-12-16 01:36:02 +01:00
.gitattributes Add .gitattributes 2019-12-16 01:09:09 +01:00
.gitignore gitignore: ignore dpdk artifacts. 2018-11-28 16:43:17 +02:00
.travis.yml msan cxx 2020-07-22 16:09:13 +02:00
autogen.sh Check for CentOS 6 2020-06-26 09:01:58 +02:00
CHANGELOG.md nDPI 3.2 changelog 2020-02-19 12:10:49 +01:00
configure.seed Enables fuzz targets even without sanitizer 2020-07-20 10:07:54 +02:00
CONTRIBUTING.md Create CONTRIBUTING.md 2019-07-23 10:47:25 +01:00
COPYING Initial import from SVN 2015-04-19 07:25:59 +02:00
INSTALL Initial import from SVN 2015-04-19 07:25:59 +02:00
libndpi.pc.in Adapt pkgconfig file include path to new Makefile install location. 2018-08-26 00:35:01 +02:00
Makefile.am Adds fuzz target 2019-10-31 08:37:42 +01:00
README.md Added link to nfstream 2020-05-15 18:11:59 +02:00
README.nDPI update README for json install lib 2017-10-06 20:04:26 +02:00
README.protocols Fix typo 2016-05-29 10:09:07 +02:00

ntop ntop

nDPI

Build Status Code Quality: Cpp Total Alerts Fuzzing Status

What is nDPI ?

nDPI is an open source LGPLv3 library for deep-packet inspection. Based on OpenDPI it includes ntop extensions. We have tried to push them into the OpenDPI source tree but nobody answered emails so we have decided to create our own source tree

How To Compile nDPI

In order to compile this library do

  • ./autogen.sh
  • ./configure
  • make

To run tests do additionally:

  • cd tests; ./do.sh

Please note that the pre-requisites for compilation include:

  • GNU tools (autogen, automake, autoconf, libtool)
  • GNU C compiler (gcc)

How To Add A New Protocol Dissector

The entire procedure of adding new protocols in detail:

  1. Add new protocol together with its unique ID to: src/include/ndpi_protocol_ids.h
  2. Create a new protocol in: src/lib/protocols/
  3. Variables to be kept for the duration of the entire flow (as state variables) need to be placed in: src/include/ndpi_typedefs.h in ndpi_flow_tcp_struct (for TCP only), ndpi_flow_udp_struct (for UDP only), or ndpi_flow_struct (for both).
  4. Add a new entry for the search function for the new protocol in: src/include/ndpi_protocols.h
  5. Choose (do not change anything) a selection bitmask from: src/include/ndpi_define.h
  6. Add a new entry in ndpi_set_protocol_detection_bitmask2 in: src/lib/ndpi_main.c
  7. Set protocol default ports in ndpi_init_protocol_defaults in: src/lib/ndpi_main.c
  8. ./autogen.sh
  9. make
  10. make check

How to use nDPI to Block Selected Traffic

You can use nDPI to selectively block selected Internet traffic by embedding it onto an application (remember that nDPI is just a library). Both ntopng and nProbe cento can do this.

DISCLAIMER

While we do our best to detect network protocols, we cannot guarantee that our software is error free and 100% accurate in protocol detection. Please make sure that you respect the privacy of users and you have proper authorization to listen, capture and inspect network traffic.

nDPI is a registered trademark.