|
| 1 | +<div align="center"> |
| 2 | + |
| 3 | +# 🛡️ RTDS - Real-Time Threat Detection System |
| 4 | + |
| 5 | + </div> |
| 6 | +<div align="center"> |
| 7 | + |
| 8 | + |
| 9 | + |
| 10 | + |
| 11 | + |
| 12 | + |
| 13 | +**🔥 Advanced Real-Time Threat Detection & Cybersecurity Monitoring System 🔥** |
| 14 | + |
| 15 | +*Detect. Analyze. Protect.* |
| 16 | + |
| 17 | +</div> |
| 18 | + |
| 19 | +--- |
| 20 | + |
| 21 | +## 🌟 **Project Overview** |
| 22 | + |
| 23 | +**RTDS** is a cutting-edge, lightweight cybersecurity simulation and detection framework designed for real-time network threat analysis. Built with modern Python architecture, it provides comprehensive monitoring capabilities for detecting sophisticated cyber attacks in live network environments. |
| 24 | + |
| 25 | +``` |
| 26 | + ██████╗ ████████╗██████╗ ███████╗ |
| 27 | + ██╔══██╗╚══██╔══╝██╔══██╗██╔════╝ |
| 28 | + ██████╔╝ ██║ ██║ ██║███████╗ |
| 29 | + ██╔══██╗ ██║ ██║ ██║╚════██║ |
| 30 | + ██║ ██║ ██║ ██████╔╝███████║ |
| 31 | + ╚═╝ ╚═╝ ╚═╝ ╚═════╝ ╚══════╝ |
| 32 | + Real-Time Detection System |
| 33 | +``` |
| 34 | + |
| 35 | +--- |
| 36 | + |
| 37 | +## ⚡ **Key Features** |
| 38 | + |
| 39 | +<table> |
| 40 | +<tr> |
| 41 | +<td width="50%"> |
| 42 | + |
| 43 | +### 🎯 **Core Capabilities** |
| 44 | +- ✅ **Real-Time Monitoring** - Live network packet analysis |
| 45 | +- ✅ **Multi-Attack Detection** - DDoS & MITM specialized detection |
| 46 | +- ✅ **Cross-Platform Support** - Windows & Linux compatible |
| 47 | +- ✅ **Lightweight Architecture** - Minimal resource consumption |
| 48 | +- ✅ **Extensible Framework** - Easy to add new detection modules |
| 49 | + |
| 50 | +</td> |
| 51 | +<td width="50%"> |
| 52 | + |
| 53 | +### 🛡️ **Security Features** |
| 54 | +- 🚨 **Intelligent Alerting** - Real-time threat notifications |
| 55 | +- 📊 **Statistical Analysis** - Advanced packet rate monitoring |
| 56 | +- 🔍 **ARP Spoofing Detection** - MITM attack identification |
| 57 | +- 💥 **DDoS Pattern Recognition** - Volumetric & SYN flood detection |
| 58 | +- 📝 **Comprehensive Logging** - Detailed attack forensics |
| 59 | + |
| 60 | +</td> |
| 61 | +</tr> |
| 62 | +</table> |
| 63 | + |
| 64 | +--- |
| 65 | + |
| 66 | +## 🎪 **Attack Detection Matrix** |
| 67 | + |
| 68 | +| Attack Type | Detection Method | Accuracy | Status | |
| 69 | +|-------------|------------------|----------|--------| |
| 70 | +| **MITM/ARP Spoofing** | 🔍 MAC Address Analysis | 95%+ | ✅ Active | |
| 71 | +| **DDoS Volumetric** | 📊 Packet Rate Monitoring | 90%+ | ✅ Active | |
| 72 | +| **SYN Flood** | 🌊 TCP Flag Analysis | 92%+ | ✅ Active | |
| 73 | +| **Gratuitous ARP** | 📡 Suspicious ARP Detection | 88%+ | ✅ Active | |
| 74 | +| **Port Scanning** | 🔭 Multi-port Detection | - | 🔄 Upcoming | |
| 75 | +| **DNS Tunneling** | 🌐 Query Analysis | - | 🔄 Upcoming | |
| 76 | + |
| 77 | +--- |
| 78 | + |
| 79 | +## 📂 **Repository Structure** |
| 80 | + |
| 81 | +``` |
| 82 | +RTDS/ |
| 83 | +├── 🐧 rtds.py # Linux version (requires sudo) |
| 84 | +├── 🪟 rtds_win.py # Windows version |
| 85 | +├── 📋 requirements.txt # Python dependencies |
| 86 | +├── 📖 README.md # This file |
| 87 | +├── 📊 logs/ # Log files directory |
| 88 | +│ └── rtds_alerts.log # Security alerts log |
| 89 | +└── 🔧 config/ # Configuration files |
| 90 | + └── whitelist.json # Trusted devices |
| 91 | +``` |
| 92 | + |
| 93 | +--- |
| 94 | + |
| 95 | +## 🛠️ **System Requirements** |
| 96 | + |
| 97 | +<div align="center"> |
| 98 | + |
| 99 | +| Component | Requirement | |
| 100 | +|-----------|-------------| |
| 101 | +| **Python Version** | 3.8+ | |
| 102 | +| **Memory** | 256MB RAM | |
| 103 | +| **Storage** | 50MB free space | |
| 104 | +| **Network** | Active network interface | |
| 105 | +| **Privileges** | Admin/Root access | |
| 106 | + |
| 107 | +</div> |
| 108 | + |
| 109 | +### 📦 **Dependencies** |
| 110 | +```bash |
| 111 | +scapy>=2.4.5 # Network packet manipulation |
| 112 | +argparse # Command-line argument parsing |
| 113 | +collections # Advanced data structures |
| 114 | +threading # Multi-threading support |
| 115 | +time # Time-based operations |
| 116 | +``` |
| 117 | + |
| 118 | +--- |
| 119 | + |
| 120 | +## 🚀 **Quick Start Guide** |
| 121 | + |
| 122 | +### 🔥 **Installation** |
| 123 | + |
| 124 | +```bash |
| 125 | +# Clone the repository |
| 126 | +git clone https://github.com/th-shivam/RTDS.git |
| 127 | +cd RTDS |
| 128 | + |
| 129 | +# Install dependencies |
| 130 | +pip install -r requirements.txt |
| 131 | +``` |
| 132 | + |
| 133 | +### 🐧 **Linux Deployment** |
| 134 | +```bash |
| 135 | +# Grant necessary permissions |
| 136 | +chmod +x rtds.py |
| 137 | + |
| 138 | +# Run with administrative privileges |
| 139 | +sudo python3 rtds.py |
| 140 | + |
| 141 | +# Custom configuration |
| 142 | +sudo python3 rtds.py --ddos-threshold 100 --iface eth0 |
| 143 | +``` |
| 144 | + |
| 145 | +### 🪟 **Windows Deployment** |
| 146 | +```powershell |
| 147 | +# Open PowerShell as Administrator |
| 148 | +cd C:\Path\To\RTDS |
| 149 | +
|
| 150 | +# Execute the Windows version |
| 151 | +python rtds_win.py |
| 152 | +
|
| 153 | +# Monitor specific interface |
| 154 | +python rtds_win.py --iface "Wi-Fi" --log "security.log" |
| 155 | +``` |
| 156 | + |
| 157 | +--- |
| 158 | + |
| 159 | +## ⚙️ **Advanced Configuration** |
| 160 | + |
| 161 | +### 🎛️ **Command Line Options** |
| 162 | + |
| 163 | +```bash |
| 164 | +python rtds.py [OPTIONS] |
| 165 | + |
| 166 | +OPTIONS: |
| 167 | + --ddos-threshold INT DDoS detection threshold (default: 100 pps) |
| 168 | + --syn-threshold INT SYN flood threshold (default: 50 pps) |
| 169 | + --iface STRING Network interface to monitor |
| 170 | + --log STRING Custom log file path |
| 171 | + --help Show help message |
| 172 | +``` |
| 173 | + |
| 174 | +### 📝 **Configuration Examples** |
| 175 | + |
| 176 | +```bash |
| 177 | +# High-security monitoring |
| 178 | +python rtds.py --ddos-threshold 50 --syn-threshold 25 |
| 179 | + |
| 180 | +# Monitor specific network interface |
| 181 | +python rtds.py --iface "Ethernet" --log "network_security.log" |
| 182 | + |
| 183 | +# Corporate network monitoring |
| 184 | +sudo python3 rtds.py --ddos-threshold 200 --iface eth0 |
| 185 | +``` |
| 186 | + |
| 187 | +--- |
| 188 | + |
| 189 | +## 📊 **Real-Time Dashboard** |
| 190 | + |
| 191 | +``` |
| 192 | +🔐 Simple RTDS v1.0 - DDoS & MITM Detection |
| 193 | +🛡️ Focused Detection: DDoS Attacks & MITM/ARP Spoofing |
| 194 | +🎯 Project Ready Version |
| 195 | +-------------------------------------------------- |
| 196 | +Detection Features: |
| 197 | +• Volumetric DDoS Detection • SYN Flood Detection |
| 198 | +• ARP Spoofing Detection • MITM Attack Detection |
| 199 | +• Real-time Monitoring • Automatic Logging |
| 200 | +-------------------------------------------------- |
| 201 | +
|
| 202 | +[*] Interface: Wi-Fi |
| 203 | +[*] DDoS Threshold: 100 pps |
| 204 | +[*] SYN Threshold: 50 pps |
| 205 | +[*] Log File: rtds_alerts.log |
| 206 | +
|
| 207 | +✓ New device mapped: 192.168.1.100 → aa:bb:cc:dd:ee:ff |
| 208 | +🚨 DDoS Attack Detected from 192.168.1.50 - Rate: 150 packets/sec |
| 209 | +⚠️ MITM/ARP Spoofing Detected! IP: 192.168.1.1 | Old MAC: aa:bb → New MAC: cc:dd |
| 210 | +📊 Runtime: 00:02:30 | Packets: 1500 | Attacks: 3 | ARP Entries: 15 |
| 211 | +``` |
| 212 | + |
| 213 | +--- |
| 214 | + |
| 215 | +## 🎯 **Attack Simulation Scenarios** |
| 216 | + |
| 217 | +<details> |
| 218 | +<summary><b>🔍 MITM Attack Detection</b></summary> |
| 219 | + |
| 220 | +**Scenario**: ARP Spoofing Attack |
| 221 | +``` |
| 222 | +Target: Router (192.168.1.1) |
| 223 | +Attacker: Malicious device attempts MAC spoofing |
| 224 | +Detection: Real-time ARP table analysis |
| 225 | +Alert: "MITM/ARP Spoofing Detected!" |
| 226 | +``` |
| 227 | +</details> |
| 228 | + |
| 229 | +<details> |
| 230 | +<summary><b>💥 DDoS Attack Detection</b></summary> |
| 231 | + |
| 232 | +**Scenario**: SYN Flood Attack |
| 233 | +``` |
| 234 | +Target: Web server (192.168.1.10) |
| 235 | +Attack: High-rate SYN packet flooding |
| 236 | +Detection: Packet rate threshold analysis |
| 237 | +Alert: "DDoS Attack Detected - Rate: 250 pps" |
| 238 | +``` |
| 239 | +</details> |
| 240 | + |
| 241 | +--- |
| 242 | + |
| 243 | +## 🔮 **Roadmap & Future Enhancements** |
| 244 | + |
| 245 | +### 🚀 **Phase 1: Core Security (Current)** |
| 246 | +- [x] DDoS Detection Engine |
| 247 | +- [x] MITM/ARP Spoofing Detection |
| 248 | +- [x] Real-time Monitoring Dashboard |
| 249 | +- [x] Cross-platform Compatibility |
| 250 | + |
| 251 | +### 🎯 **Phase 2: Advanced Threats (Upcoming)** |
| 252 | +- [ ] 🔭 Port Scanning Detection |
| 253 | +- [ ] 🌐 DNS Tunneling Analysis |
| 254 | +- [ ] 🔒 Encrypted Traffic Analysis |
| 255 | +- [ ] 🤖 Machine Learning Integration |
| 256 | + |
| 257 | +### 🌟 **Phase 3: Enterprise Features (Future)** |
| 258 | +- [ ] 📱 Web-based Dashboard |
| 259 | +- [ ] 🔔 Email/SMS Alerting |
| 260 | +- [ ] 📈 Advanced Analytics |
| 261 | +- [ ] 🌍 Distributed Monitoring |
| 262 | + |
| 263 | +--- |
| 264 | + |
| 265 | +## 📸 **Screenshots & Demo** |
| 266 | + |
| 267 | +<div align="center"> |
| 268 | + |
| 269 | +### 🖥️ **Live Detection Interface** |
| 270 | + |
| 271 | + |
| 272 | +### 📊 **Attack Statistics Dashboard** |
| 273 | + |
| 274 | + |
| 275 | +</div> |
| 276 | + |
| 277 | +--- |
| 278 | + |
| 279 | +## 🤝 **Contributing to RTDS** |
| 280 | + |
| 281 | +We welcome contributions from the cybersecurity community! |
| 282 | + |
| 283 | +### 🎯 **How to Contribute** |
| 284 | +1. 🍴 **Fork** the repository |
| 285 | +2. 🌱 **Create** a feature branch (`git checkout -b feature/AmazingFeature`) |
| 286 | +3. 💾 **Commit** your changes (`git commit -m 'Add AmazingFeature'`) |
| 287 | +4. 📤 **Push** to the branch (`git push origin feature/AmazingFeature`) |
| 288 | +5. 🎉 **Open** a Pull Request |
| 289 | + |
| 290 | +### 🐛 **Bug Reports** |
| 291 | +Found a bug? Please create an issue with: |
| 292 | +- Detailed description |
| 293 | +- Steps to reproduce |
| 294 | +- Expected vs actual behavior |
| 295 | +- System information |
| 296 | + |
| 297 | +--- |
| 298 | + |
| 299 | +## 📜 **License & Legal** |
| 300 | + |
| 301 | +``` |
| 302 | +MIT License |
| 303 | +
|
| 304 | +Copyright (c) 2024 RTDS Project |
| 305 | +
|
| 306 | +Permission is hereby granted, free of charge, to any person obtaining a copy |
| 307 | +of this software and associated documentation files (the "Software"), to deal |
| 308 | +in the Software without restriction, including without limitation the rights |
| 309 | +to use, copy, modify, merge, publish, distribute, sublicense, and/or sell |
| 310 | +copies of the Software, and to permit persons to whom the Software is |
| 311 | +furnished to do so, subject to the following conditions: |
| 312 | +
|
| 313 | +The above copyright notice and this permission notice shall be included in all |
| 314 | +copies or substantial portions of the Software. |
| 315 | +``` |
| 316 | + |
| 317 | +--- |
| 318 | + |
| 319 | +## ⚠️ **Disclaimer** |
| 320 | + |
| 321 | +> **Educational Purpose**: This tool is designed for educational and research purposes in cybersecurity. Users are responsible for ensuring compliance with applicable laws and regulations. The developers are not responsible for any misuse of this software. |
| 322 | +
|
| 323 | +--- |
| 324 | + |
| 325 | +<div align="center"> |
| 326 | + |
| 327 | +## 🌟 **Connect With Us** |
| 328 | + |
| 329 | +[](https://github.com/th-shivam) |
| 330 | +[](https://www.linkedin.com/in/shivam-singh-352492310/) |
| 331 | +<!--[](https://twitter.com/yo)--> |
| 332 | + |
| 333 | +--- |
| 334 | + |
| 335 | +**⭐ If RTDS helped you in your cybersecurity journey, please give us a star! ⭐** |
| 336 | + |
| 337 | +**Made with ❤️ by Shivam Singh - Project Lead & Developer** |
| 338 | + |
| 339 | +</div> |
0 commit comments