Github user tdunning commented on the issue:

    https://github.com/apache/drill/pull/1080
  
    To follow sequences, group by session id, order by time or sequence number.
    
    This assumes ports are not reused to the same host very often. Will break
    occasionally under odd conditions such as super high connection rate behind
    a broken proxy with no keep alive.
    
    
    On Jan 2, 2018 7:41 PM, "Charles S. Givre" <[email protected]> wrote:
    
    > Hi Ted,
    > Thanks for doing this. This looks really great! The PCAP files came from
    > here: https://github.com/chrissanders/packets. The author said that they
    > are free to use, but asks for retribution.
    >
    > When I started poking at this, and my original thought was to add a
    > boolean column for each TCP flag which would facilitate analysis, as well
    > as a field which contains all the flags. My original thought was that 
would
    > enable you to quickly detect things like SYN scans and the like. I've been
    > going through Practical Packet Analysis by Chris Sanders and trying to do
    > some of the same things he does in Wireshark with Drill. The next thing I
    > was going to try to do was figure out a way of getting Drill to follow
    > sequences.
    >
    > —
    > You are receiving this because you authored the thread.
    > Reply to this email directly, view it on GitHub
    > <https://github.com/apache/drill/pull/1080#issuecomment-354932156>, or 
mute
    > the thread
    > 
<https://github.com/notifications/unsubscribe-auth/AAPSer4NlGCG2NVsDPLLmmNzAwBy88Knks5tGvbjgaJpZM4RRO_1>
    > .
    >



---

Reply via email to