Skip to content

akshatcore/SentinelShield

Repository files navigation

Version 4.0 Status Python Machine Learning UI

🛡️ SentinelShield SOC v4.0

An Elite, AI-Driven Next-Generation Web Application Firewall & Security Operations Center.

SentinelShield Live Dashboard

⚡ What is SentinelShield?

SentinelShield is an enterprise-grade Web Application Firewall (WAF) designed to act as an impenetrable reverse proxy gateway. It intercepts, analyzes, and neutralizes malicious web traffic before it ever touches your backend infrastructure.

With the v4.0 Architectural Overhaul, SentinelShield has evolved from a static, reactive filter into a proactive, predictive, and autonomous defense engine. It doesn't just block known threats—it mathematically calculates evasion attempts, reads the grammar of zero-day attacks using Machine Learning, and autonomously writes its own code to adapt to new threats in real-time.


📈 The Evolution of SentinelShield (v3.0 ➔ v4.0)

Version 4.0 represents a massive leap in cybersecurity architecture, moving from rule-based filtering to AI-driven predictive modeling.

Feature Category SentinelShield v3.0 (Reactive) SentinelShield v4.0 (Predictive) 🚀
Detection Engine Static Regex Pattern Matching True Machine Learning (NLP) using Scikit-Learn (TF-IDF Vectorization & Logistic Regression).
Evasion Defense Relied on deep URL decoding. Mathematical Anomaly Detection using real-time Shannon Entropy calculations to catch Base64/Hex obfuscation.
Bot & Scanner Defense Basic Volumetric Rate Limiting. Time-Series Behavioral Fingerprinting tracks stateful memory to permanently ban vulnerability scanners (Nikto, Burp).
Rule Generation Manual admin approval required. Zero-Touch Autonomous Self-Healing. AI writes, approves, and hot-reloads its own Regex rules instantly.
False Positive Control Prone to blocking standard headers. Payload Isolation Pipeline cleanly strips safe headers/URLs to scan only the pure attack string.
Command Center UI Static dark mode dashboard. Dynamic Glassmorphism UI with Live AI Memory Tracking, visual telemetry, and custom SOC wallpaper engines.
Alerting System Hardcoded Telegram credentials. Interactive Telegram OAuth via UI deep-linking, allowing admins to instantly connect/disconnect push alerts.

📸 Command Center Interface

1. Live Threat Monitor

The central nerve center. Features real-time EKG traffic monitoring, Doughnut threat classification, and Global Threat Origin mapping via a dynamic glassmorphic UI.

Live Monitor

2. Deep Inspection Logs & Forensics

A searchable, filterable database of every intercepted threat. Click into any log to open the Forensics Workbench, view compromised headers, isolate the exact malicious payload, or download a PDF incident report.

Inspection Logs

3. System Configuration & Active AI Memory

Tune the WAF engine on the fly without rebooting the server. Adjust risk thresholds, upload custom SOC wallpapers, link/unlink Telegram alerts, and monitor the Active AI Knowledge Base as the engine writes its own defense rules.

System Config

4. Active Detention List

Automatically manages IP bans triggered by the Volumetric Rate Limiter and Behavioral Fingerprinting. Tracks offender IPs, detention start times, and automated release schedules.

Detention List

🛠️ Architecture & Tech Stack

Component Technology Description
Backend Engine Python / Flask High-speed request interception & WAF logic
AI / NLP Engine Scikit-Learn (TF-IDF) Logistic Regression for Zero-Day prediction
Production Server Waitress WSGI Multi-threaded enterprise traffic handling
Database SQLite3 Lightweight, ultra-fast threat & dynamic rule storage
Frontend UI HTML5 / CSS3 / JS Zero-dependency vanilla JS with Chart.js
Threat Intel MaxMind / AbuseIPDB Geographic IP mapping and global threat scoring

🚀 Installation & Deployment Guide

Follow these steps to deploy SentinelShield as a reverse proxy for your own web applications.

1. Set Up the Environment

# Clone the repository
git clone [https://github.com/akshatcore/SentinelShield.git](https://github.com/akshatcore/SentinelShield.git)
cd SentinelShield

# Create and activate a virtual environment
python -m venv venv

# On Windows:
venv\Scripts\activate
# On Mac/Linux:
source venv/bin/activate
2. Install Dependencies
Bash
pip install flask requests pyjwt bcrypt geoip2 reportlab waitress python-dotenv scikit-learn numpy
3. Configure the Security Environment
For security reasons, hardcoded secrets are not included in this repository.

Copy the template file: Rename .env.example to .env.

Open .env and configure your target backend and secure passwords:

Code snippet
# --- WAF ROUTING ---
REVERSE_PROXY_URL=[http://your-vulnerable-backend.com](http://your-vulnerable-backend.com)

# --- CORE SECURITY ---
SECRET_KEY=generate_a_random_string_here
JWT_SECRET=generate_another_random_string_here
ADMIN_USER=admin
ADMIN_PASS=your_secure_password

# --- EXTERNAL INTEGRATIONS (Optional) ---
TELEGRAM_BOT_TOKEN=your_telegram_token_here
ABUSEIPDB_API_KEY=your_abuseipdb_api_key_here
4. Provide Local Assets
Background Image: Add your favorite high-res wallpaper to static/ and name it exactly background.jpeg.

GeoIP Database: Download the free GeoLite2-City.mmdb database from MaxMind and place it in the root folder.

5. Initialize the Gateway
Start the production Waitress server. The threat database and AI learning models will safely auto-generate on the first boot.

Bash
python app.py
Access the secure SOC Dashboard at: http://127.0.0.1:5000/

👨‍💻 Author
Akshat Tiwari (@akshatcore)

⚠️ Disclaimer

SentinelShield is built strictly for defensive cybersecurity purposes. Do not use the integrated replay tools or forensics suite to launch attacks against networks or applications you do not own or have explicit permission to test.

About

An Elite, AI-Driven Next-Generation Web Application Firewall & Security Operations Center (SOC). Built for enterprise traffic interception.

Topics

Resources

Stars

Watchers

Forks

Contributors