Skip to content

CHAbhiram/Insider-Threat-Monitor-

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Here’s a professional README.md for your Insider Threat Monitor project. It includes:

  • πŸ“ Installation Steps
  • πŸƒβ€β™‚οΈ How to Run
  • βš™οΈ Dependencies
  • πŸ–ΌοΈ Screenshots with Descriptions
  • πŸ› οΈ Code Customization Guide

🌟 README.md

# Insider Threat Monitor

> **Detect and analyze insider threats in real-time using Windows Event Logs (`.evtx`).**

This tool parses `.evtx` files, detects suspicious activities, and provides a web-based dashboard for monitoring login patterns, critical events, and detected threats.

---

## πŸš€ Table of Contents
1. [Overview](#overview)
2. [Installation](#installation)
3. [How to Run](#how-to-run)
4. [Dependencies](#dependencies)
5. [Screenshots](#screenshots)
6. [Customization](#customization)

---

## 🎯 Overview

The **Insider Threat Monitor** is designed to:
- Parse Windows Security Event Logs (`security.evtx`).
- Detect suspicious activities like after-hours logins, mass file access, and USB device usage.
- Provide a user-friendly dashboard with real-time alerts and analytics.

### Key Features:
- πŸ”’ **Authentication**: Secure admin login with default credentials (`admin / admin123`).
- πŸ“Š **Dashboard**: Real-time stats and charts.
- 🚨 **Alerts**: Detailed list of detected threats.
- πŸ• **Live Feed**: Real-time event streaming.

---

## 🏁 Installation

### 1. Clone the Repository
```bash
git clone https://github.com/yourusername/Insider-Threat-Monitor.git
cd Insider-Threat-Monitor

2. Create Virtual Environment

python -m venv venv
venv\Scripts\activate  # Windows
source venv/bin/activate  # macOS/Linux

3. Install Dependencies

pip install -r requirements.txt

4. Prepare Data

Ensure you have a valid .evtx file in data/security.evtx.


πŸš€ How to Run

1. Parse Log File

python core/log_parser.py data/security.evtx data/events.csv

2. Generate Alerts

python core/alert_engine.py

3. Start the Dashboard

python app.py

Open: http://localhost:5001


πŸ“¦ Dependencies

Package Purpose
Flask Web framework
pandas Data processing
Evtx Parse .evtx logs
Flask-Login Authentication

Install all dependencies via:

pip install -r requirements.txt

πŸ–ΌοΈ Screenshots

1. Login Page

Screenshot 2025-08-28 180800
  • Default Credentials: admin / admin123
  • Secure authentication ensures only authorized users can access sensitive data.

2. Dashboard Home

Screenshot 2025-08-28 180852
  • Stats at a Glance:
    • Total Events
    • Users
    • Critical Events
  • Login Activity Chart: Shows non-zero hours with login activity.

3. Detected Threats

Screenshot 2025-08-28 180915
  • Detailed Alerts: Lists suspicious activities with timestamps, risk levels, and descriptions.
  • High-risk events are highlighted for quick action.

4. Live Feed

Screenshot 2025-08-28 181006
  • Real-time Updates: Displays ongoing events as they occur.
  • Risk Levels: Indicates severity for each event.

πŸ› οΈ Customization

1. Change Default Credentials

Edit app.py:

USERS = {
    'admin': {
        'password': 'new_password',  # Change this!
        'id': 1
    }
}

2. Modify Detection Rules

Edit config/rules.json:

{
  "after_hours_window": [2, 5],  # After-hours detection window
  "file_access_threshold": 50,    # Threshold for mass file access
  "critical_event_ids": [4624, 4663, 4664, 4688],
  "alert_emails": [],
  "description": "Detection rules for insider threat monitoring",
  "version": "1.0"
}

3. Add New Alert Types

In core/alert_engine.py, add new rules under generate_alerts().

4. Change Layout or Styling

Edit dashboard/static/style.css for custom styling.


πŸ“œ License

MIT License Β© 2025 Your Name

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, subject to the following conditions...


🀝 Contributing

Pull requests are welcome! For major changes, please open an issue first.


🌐 Deployment

Deploy to:

  • Docker
  • Heroku
  • AWS Elastic Beanstalk

About

Insider Threat Monitor

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages