Skip to content

ManasMadan/sih-2023-it-log

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

IT System log analyzer

Problem Statement

1408 - IT System log analyzer

Organization

Ministry of Home Affairs

Category

Software

Domain Bucket

Blockchain & Cybersecurity

Objective

This website aims to address the need for a centralized system to analyze IT system logs across different locations of the Central Reserve Police Force (CRPF). Currently, there is no central platform for experts to assess threats and security breaches systematically. The proposed solution is to develop a centralized system for analyzing the IT systems deployed at various CRPF locations across the country.

Team Name : AlgoAllies

Team Leader : @ManasMadan

Team

  • Meghna Malasi - 2022UCS1611
  • Krish Gupta - 2022UIC3507
  • Tanish Saxena - 2022UIC3511
  • Manas Madan - 2022UIC3533
  • Ayush Arora - 2022UIC3538
  • Devansh Behl - 2022UIC3582

Tech Stack

Key Features

Log Analysis

  • Real-time Analysis: The system provides real-time log analysis capabilities, allowing experts to monitor IT system activities as they happen.

  • Threat Detection: Advanced algorithms and machine learning techniques are employed to detect potential threats, anomalies, and security breaches within the IT systems.

  • Customizable Alerts: Experts can configure customizable alerts and notifications based on specific log patterns or security events, ensuring prompt response to potential issues.

Visualization and Reporting

  • Data Visualization: The system offers interactive data visualization tools, including graphs and charts, to help experts gain insights from log data more effectively.

  • Detailed Reports: Comprehensive reports are generated, summarizing log analysis findings, security incidents.

  • Role-based Access: User roles and permissions are defined to ensure that only authorized personnel can access and modify log data and analysis settings.

Log Collection and Management

  • Log Data Storage: Log data from various CRPF units and offices is collected, securely stored, and organized in a structured database for efficient retrieval.

  • Data Ingestion: The backend provides mechanisms for ingesting log data from diverse sources, ensuring compatibility and data integrity.

  • Data Retention: Define data retention policies to manage the storage of log data, ensuring compliance with data protection regulations.

Real-time Analysis

  • Threat Detection Engine: Implement advanced algorithms and machine learning models to detect security threats, anomalies, and breaches in real-time.

  • Alerting System: Create an alerting system that triggers notifications and alerts when potential security incidents are detected.

API and Data Access

  • RESTful APIs: Provide RESTful APIs for the frontend to access log data, analysis results, and configuration settings securely.

  • User Authentication: Implement secure user authentication and authorization mechanisms for API access.

  • Data Visualization: Offer APIs for data visualization tools to fetch real-time insights and generate reports.

Blocking IPs and Actions

  • Blocks IP Address: Based on the ML Model predictions the system blocks suspicious IP address
  • Block Actions: Based on the ML Model predictions the system restricts certain actions like downloading Malware, chaging Firewall rules etc.

Machine Learning

  • Machine Learning to Predict Threat Level of a log

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published