Skip to content

El-shado/SentinLLM-CyberDefense

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🛡️ SentinLLM: Agentic Log Analysis & Threat Mitigation

📌 Project Overview

SentinLLM is a Proof of Concept (POC) designed for the TCS GenAI Internship application. It serves as a Multi-Agent Cyber Defense System that autonomously parses server logs, detects security threats (e.g., Brute Force, SQL Injection, Unauthorized Access), and recommends actionable mitigation strategies based on OWASP and Functional Safety (FuSa) standards.

🚀 Tech Stack

  • Orchestration: CrewAI (Agentic AI Framework)
  • LLM Engine: Groq (Inference Speed) running Meta Llama 3.3-70b-Versatile
  • Integration: LangChain
  • Frontend: Streamlit
  • Language: Python 3.13

🧠 Agentic AI Architecture

SentinLLM employs a Multi-Agent Orchestration pattern where specialized autonomous agents collaborate to solve complex security tasks:

  1. Agent 1: SOC Analyst 🕵️‍♂️

    • Role: Detect patterns in raw logs.
    • Capabilities: Identifying Brute Force attacks, SQL Injections, and abnormal behavior.
    • Goal: Provide a structured analysis of threats.
  2. Agent 2: Security Engineer 🛠️

    • Role: Mitigation & Hardening.
    • Capabilities: Mapping threats to firewall rules (iptables/ufw) and code fixes.
    • Goal: Ensure system resilience and compliance with FuSa protocols.

🛡️ Relevance to Functional Safety (FuSa)

In modern automotive and industrial systems (ISO 26262), cybersecurity is a prerequisite for safety. SentinLLM demonstrates how Agentic AI can provide continuous monitoring and rapid response mechanisms, essential for maintaining the integrity and availability of safety-critical systems.

⚙️ Setup & Installation

  1. Clone the Repository

    git clone https://github.com/your-username/SentinLLM.git
    cd SentinLLM
  2. Install Dependencies

    pip install -r requirements.txt
  3. Configure Environment Create a .env file in the root directory:

    GROQ_API_KEY=gsk_your_groq_api_key_here
  4. Run the Application

    streamlit run app.py
  5. Usage

    • Upload a server log file (.txt or .log).
    • Click "Run SentinLLM Analysis".
    • View the Threat Distribution Chart and detailed Mitigation Plan.

Built with ❤️ for the TCS GenAI Internship.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages