Network Security Monitoring Tool
Network Sentinel is a sophisticated network security monitoring tool that uses machine learning for threat detection and real-time network analysis.
- Advanced ensemble learning system
- Improved anomaly detection
- Better threat classification
- Reduced false positives
- Enhanced performance metrics
- Comprehensive packet analysis
- Flow-based statistics
- Protocol-specific features
- Real-time pattern detection
- Memory-efficient processing
- π Real-time packet analysis and threat detection
- π€ Machine Learning-based anomaly detection
- π¨ Advanced port scan detection (NULL, SYN, ACK scans)
- π Live traffic monitoring and visualization
- π‘οΈ Detection of common attack patterns
- π Detailed logging and reporting
- π Secure storage of sensitive data
- π Performance monitoring and optimization
- Machine Learning Integration
- Anomaly detection using Isolation Forest
- Pattern recognition for attack detection
- Adaptive threat detection with continuous learning
- Real-time classification of threats
- Live packet analysis and inspection
- Traffic visualization and statistics
- Resource usage monitoring
- Performance optimization
- Automated alerts
- Updated dependency management
- Enhanced testing framework
- Improved code quality tools
- Better documentation
- Security scanning integration
- Machine Learning-based analysis
- Real-time packet inspection
- Flow-based anomaly detection
- Protocol-specific analysis
- Adaptive threat detection
- CPU usage optimization
- Memory management
- Resource usage tracking
- Performance metrics
- Real-time statistics
- Enhanced scan detection
- Flood attack prevention
- Malware C2 detection
- Secure data storage
- Privilege management
- Python 3.8+ compatibility
- Cross-platform support (Windows, Linux)
- Modular architecture
- Extensible plugin system
- REST API support (upcoming)
- ML-powered threat detection
- High CPU usage during initial ML training
- False positives in certain network conditions
- Limited IPv6 support
- Memory optimization needed for large networks
- Enhanced ML model accuracy
- GUI interface
- Network topology mapping
- Threat intelligence integration
- Advanced reporting system
- Cloud integration
- Go to Issues
- Click "New Issue"
- Select "π Bug Report"
- Fill in the template with detailed information
- Include logs and screenshots if possible
- Go to Issues
- Click "New Issue"
- Select "π‘ Feature Request"
- Describe your feature idea
- Explain the use case and benefits
- Author: D3F417
- Team: RastaKhiz Team
- Version: 2.1.0
sudo apt-get update
sudo apt-get install python3-dev python3-pip tcpdump wireshark- Clone repository
git clone https://github.com/D3F417/network-sentinel.git
cd network-sentinel- Create virtual environment
python3 -m venv venv
source venv/bin/activate- Install requirements
pip install -r requirements.txt- Install package
pip install -e .- Check if installed
pip list | grep network-sentinel- Test CLI
network-sentinel --help- List available interfaces
sudo network-sentinel list-interfaces- Start monitoring (replace eth0 with your interface)
sudo network-sentinel monitor -i eth0 -v-
Install Npcap:
- Download from Npcap website
- Run installer as administrator
- Select "Install Npcap in WinPcap API-compatible Mode"
-
Install Wireshark (optional but recommended):
- Download from Wireshark website
- This will provide the manufacturer database for better device identification
- Open PowerShell as Administrator and run:
Set-ExecutionPolicy RemoteSigned- Create virtual environment
python -m venv venv- Activate (PowerShell)
.\venv\Scripts\Activate.ps1
Or CMD
venv\Scripts\activate.bat-Install requirements
pip install -r requirements.txt- Install the package in development mode
pip install -e .- Check if installed
pip list | findstr network-sentinel- Test CLI
network-sentinel --helpOpen PowerShell as Administrator and run: List available interfaces
network-sentinel list-interfaces- Start monitoring (replace "Wi-Fi" with your interface name)
network-sentinel monitor -i "Wi-Fi" -vList available interfaces
sudo network-sentinel list-interfacesStart monitoring (replace eth0 with your interface)
sudo network-sentinel monitor -i eth0 -v- D3F417 - Initial work and maintenance - Sir-D3F417
- RastaKhiz Team - Development Team
- Email: info@d3f417.info
- GitHub: Sir-D3F417
Stop the service if installed
Stop-Service NetworkSentinel -ErrorAction SilentlyContinuepip uninstall network-sentinel -yRemove configuration and data directories
Remove-Item -Path "$env:APPDATA\Network-Sentinel" -Recurse -Force -ErrorAction SilentlyContinue
Remove-Item -Path "$env:LOCALAPPDATA\Network-Sentinel" -Recurse -Force -ErrorAction SilentlyContinueRemove logs
Remove-Item -Path ".\logs" -Recurse -Force -ErrorAction SilentlyContinueRemove models
Remove-Item -Path ".\models" -Recurse -Force -ErrorAction SilentlyContinueRemove session data
Remove-Item -Path "session_stats.json" -Force -ErrorAction SilentlyContinue
Remove-Item -Path ".enc" -Force -ErrorAction SilentlyContinu
