You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+26Lines changed: 26 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,6 +13,21 @@ A comprehensive, **GSOC-level security monitoring solution** that leverages Arti
13
13
14
14
This platform is designed to bridge the gap between traditional log monitoring and modern AI-driven threat intelligence. By ingesting system and network logs in real-time, parsing them through an advanced **Isolation Forest** machine learning model, and visualizing the results on a dynamic **Next.js Dashboard**, it empowers security teams to identify zero-day attacks and subtle anomalies that rule-based systems miss.
Model --> Scored[Scored Events - Normal / Suspicious / Critical]
24
+
Scored --> API[REST API]
25
+
API --> Dashboard[Next.js Dashboard]
26
+
Dashboard --> Visuals[3D Globe & Network Graph]
27
+
```
28
+
29
+
The platform ingests raw system and network logs, stores them in a relational database, scores them with an Isolation Forest model, and serves the results to a Next.js dashboard that renders traditional charts and immersive 3D visualizations.
30
+
16
31
## 🚀 Key Features
17
32
18
33
***🕵️ Real-time Anomaly Detection**: Utilizes Unsupervised Learning (Isolation Forest) to detect outliers in network traffic and user behavior.
@@ -35,6 +50,17 @@ This platform is designed to bridge the gap between traditional log monitoring a
35
50
***Pandas & NumPy**: Data manipulation and feature extraction.
36
51
***SQLAlchemy & SQLite**: ORM and Database (Easily scalable to PostgreSQL).
37
52
53
+
*### 🤖 Why Isolation Forest?
54
+
55
+
This project focuses on unsupervised anomaly detection, where labeled attack data is rare and patterns evolve quickly. Isolation Forest is well-suited because:
56
+
57
+
- It works **without labeled data**, matching real-world security logs where we don't have ground-truth labels for every event.
58
+
- It handles **high-dimensional, noisy features** (IPs, ports, sizes, timings) with robust performance.
59
+
- Compared to density-based methods (like LOF), it **scales better** to large log volumes and is faster to train and infer with.
60
+
- Compared to supervised classifiers, it doesn't overfit to known attack signatures and can surface **previously unseen, zero-day style anomalies**.
61
+
62
+
These properties make Isolation Forest a practical baseline model for an AI-powered security monitoring platform, while leaving room for future extensions (autoencoders, ensembles, or hybrid rules-plus-ML systems).
0 commit comments