jatinyadav0616/Cyber-Threat-Intelligence-System

GitHub: jatinyadav0616/Cyber-Threat-Intelligence-System

一个基于Python和机器学习的网络威胁情报系统,能够实时检测零日漏洞、DDoS、SQL注入等8类威胁并自动生成情报报告。

Stars: 0 | Forks: 0

# 🔐 网络威胁情报系统 (CTIS)
![Python](https://img.shields.io/badge/Python-3.8%2B-blue?style=for-the-badge&logo=python) ![ML](https://img.shields.io/badge/Machine%20Learning-Random%20Forest-green?style=for-the-badge&logo=scikit-learn) ![Cybersecurity](https://img.shields.io/badge/Cybersecurity-Threat%20Detection-red?style=for-the-badge&logo=shield) ![Status](https://img.shields.io/badge/Status-Active-brightgreen?style=for-the-badge) ![Accuracy](https://img.shields.io/badge/Accuracy-97.67%25-success?style=for-the-badge) **一个 AI 驱动的实时网络威胁检测与情报系统** 由 [Jatin Yadav](https://www.linkedin.com/in/jatin-yadav-72612b257/) 构建
## 📌 什么是 CTIS? CTIS 是一个全栈 **网络威胁情报系统**,可实时监控网络流量,利用 Machine Learning 对威胁进行分类,按风险等级对攻击者 IP 进行评分,检测协同攻击活动,并自动生成专业的威胁情报报告 —— 就像一个真正的安全运营中心 (SOC)。 ## 🎯 功能特性 | 功能 | 描述 | |--------|-------------| | 🤖 **AI 威胁分类器** | Random Forest 在 8 种威胁类型中达到 97.67% 的准确率 | | 🔍 **异常检测** | Isolation Forest 标记未知/零日类型的威胁 | | 📊 **风险评分引擎** | 实时对每个攻击者 IP 进行 0-100 分的评分 | | 🕵️ **攻击活动检测** | 识别多 IP 协同攻击活动 | | 📄 **TIR 生成器** | 自动生成带有唯一 ID 的威胁情报报告 | | 🖥️ **实时 SOC 仪表板** | 实时彩色终端仪表板 | ## 🚨 检测的威胁类型 ``` ┌─────────────────────────────────────────────────────┐ │ THREAT TYPE RISK SCORE SEVERITY │ ├─────────────────────────────────────────────────────┤ │ Zero-Day Exploit 95/100 🔴 CRITICAL │ │ Data Exfiltration 90/100 🔴 CRITICAL │ │ Privilege Escalation 85/100 🔴 CRITICAL │ │ Malware C2 Beacon 80/100 🔴 CRITICAL │ │ DDoS Attack 70/100 🟡 HIGH │ │ Brute Force 65/100 🟡 HIGH │ │ SQL Injection 60/100 🟡 HIGH │ │ Port Scan 40/100 🔵 MEDIUM │ │ Normal Traffic 5/100 🟢 SAFE │ └─────────────────────────────────────────────────────┘ ``` ## 🛠️ 技术栈 ``` Language : Python 3.8+ ML Models : Random Forest Classifier (Supervised) : Isolation Forest (Unsupervised) Libraries : scikit-learn, pandas, numpy Dataset : NSL-KDD style (3,000 network events) Features : 11 behavioral + network features ``` ## ⚡ 快速开始 ### 1. 克隆仓库 ``` git clone https://github.com/jatinyadav0616/Cyber-Threat-Intelligence-System.git cd Cyber-Threat-Intelligence-System ``` ### 2. 安装依赖 ``` pip install scikit-learn pandas numpy ``` ### 3. 运行 CTIS ``` python ctis.py ``` ### 4. 启动实时 SOC 仪表板 ``` Press ENTER when prompted → Live dashboard starts ``` ## 📸 输出预览 ### 🔹 阶段 1 — AI 训练与分析 ``` [1/6] Ingesting network event logs... ✓ 3,000 entries loaded [2/6] Anomaly detection (Isolation Forest) ✓ 450 anomalies flagged [3/6] Training AI classifier... ✓ Accuracy: 97.67% [4/6] Computing IP risk scores... ✓ 1,398 critical IPs [5/6] Detecting attack campaigns... ✓ 8 campaigns found [6/6] Generating Threat Intel Report... ✓ TIR ready ``` ### 🔹 阶段 2 — 威胁情报报告 ``` ╔══════════════════════════════════════════════════╗ ║ THREAT INTELLIGENCE REPORT (TIR) ║ ║ Report ID : TIR-5661A127 ║ ║ Analyst : AI Engine | Jatin Yadav ║ ╚══════════════════════════════════════════════════╝ Total Events : 3,000 | Malicious : 71.3% Campaigns : 8 | Accuracy : 97.67% ``` ### 🔹 阶段 3 — 实时 SOC 仪表板 ``` 🖥️ LIVE SOC DASHBOARD — REAL-TIME THREAT MONITOR ══════════════════════════════════════════════════ TIME SRC IP PORT THREAT RISK STATUS 11:13:18 45.155.82.200 80 ZERO DAY 95 🚨 CRITICAL 11:13:19 23.129.179.124 53 BRUTE FORCE 85 🚨 CRITICAL 11:13:20 140.114.59.247 443 NORMAL 5 ✅ SAFE 11:13:21 198.98.134.187 443 DDOS 85 🚨 CRITICAL ``` ## 🧠 工作原理 ``` Network Logs (3,000 events) │ ▼ ┌─────────────────────┐ │ Isolation Forest │ ← Flags anomalies (unsupervised) └────────┬────────────┘ │ ▼ ┌─────────────────────┐ │ Random Forest │ ← Classifies threat type (97.67% accuracy) └────────┬────────────┘ │ ▼ ┌─────────────────────┐ │ Risk Scoring │ ← Scores each IP 0-100 └────────┬────────────┘ │ ▼ ┌─────────────────────┐ │ Campaign Detector │ ← Groups coordinated attacks └────────┬────────────┘ │ ▼ ┌─────────────────────┐ │ TIR + SOC Dashboard│ ← Report + Live monitoring └─────────────────────┘ ``` ## 📁 项目结构 ``` Cyber-Threat-Intelligence-System/ ├── ctis.py ← Main system (all-in-one) ├── README.md ← This file └── threat_report.txt ← Auto-generated after each run ``` ## 🎓 关于开发者 **Jatin Yadav** - 🎓 计算机工程 B.Tech + 网络安全辅修 - 🏛️ Shri Vishwakarma Skill University, Palwal, Haryana - 🏅 NDA-153 & INAC-115 推荐者 - 💼 前任 Python 开发实习生 @ Trackila Smart Innovations - 🔐 Fortinet 认证 — 威胁态势入门 3.0 [![LinkedIn](https://img.shields.io/badge/LinkedIn-Connect-blue?style=flat&logo=linkedin)](https://www.linkedin.com/in/jatin-yadav-72612b257/) [![GitHub](https://img.shields.io/badge/GitHub-Follow-black?style=flat&logo=github)](https://github.com/jatinyadav0616) ## 🚀 未来改进 - [ ] 使用 **Scapy** 进行实时数据包捕获 - [ ] 使用 **Flask + Chart.js** 构建 Web 仪表板 - [ ] 针对 CRITICAL(严重)威胁的电子邮件警报 - [ ] 与真实的 **SIEM 工具** 集成 - [ ] 部署为 **后台服务** - [ ] 连接到真实的 **CICIDS2017 数据集** ## 📜 许可证 本项目基于 [MIT 许可证](LICENSE) 开源。
⭐ **如果你觉得有用,请给这个仓库点个 Star!** ⭐
标签:Apex, CISA项目, DDoS检测, IP 地址批量处理, Python, SOC仪表盘, 人工智能, 威胁情报, 孤立森林, 安全运营中心, 密码管理, 开发者工具, 异常检测, 恶意软件C2, 无后门, 机器学习, 用户模式Hook绕过, 网络安全, 网络映射, 网络流量分析, 自动化报告, 逆向工具, 随机森林, 隐私保护, 零日漏洞