๐ฅ Advanced Real-Time Threat Detection & Cybersecurity Monitoring System ๐ฅ
Detect. Analyze. Protect.
RTDS is a cutting-edge, lightweight cybersecurity simulation and detection framework designed for real-time network threat analysis. Built with modern Python architecture, it provides comprehensive monitoring capabilities for detecting sophisticated cyber attacks in live network environments.
โโโโโโโ โโโโโโโโโโโโโโโโ โโโโโโโโ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโ
โโโโโโโโ โโโ โโโ โโโโโโโโโโโ
โโโโโโโโ โโโ โโโ โโโโโโโโโโโ
โโโ โโโ โโโ โโโโโโโโโโโโโโโโ
โโโ โโโ โโโ โโโโโโโ โโโโโโโโ
Real-Time Detection System
|
|
| Attack Type | Detection Method | Accuracy | Status |
|---|---|---|---|
| MITM/ARP Spoofing | ๐ MAC Address Analysis | 95%+ | โ Active |
| DDoS Volumetric | ๐ Packet Rate Monitoring | 90%+ | โ Active |
| SYN Flood | ๐ TCP Flag Analysis | 92%+ | โ Active |
| Gratuitous ARP | ๐ก Suspicious ARP Detection | 88%+ | โ Active |
| Port Scanning | ๐ญ Multi-port Detection | 85%+ | โ Active |
| DNS Tunneling | ๐ Entropy & Pattern Analysis | 90%+ | โ Active |
| Phishing URLs | ๐ฃ VirusTotal Integration | 88%+ | โ Active |
RTDS/
โโโ ๐ง rtds.py # Linux version (requires sudo)
โโโ ๐ช rtds_win.py # Windows version
โโโ ๐ requirements.txt # Python dependencies
โโโ ๐ README.md # This file
โโโ ๐ logs/ # Log files directory
โ โโโ rtds_alerts.log # Security alerts log
โโโ ๐ง config/ # Configuration files
โโโ whitelist.json # Trusted devices
| Component | Requirement |
|---|---|
| Python Version | 3.8+ |
| Memory | 256MB RAM |
| Storage | 50MB free space |
| Network | Active network interface |
| Privileges | Admin/Root access |
scapy>=2.4.5 # Network packet manipulation
argparse # Command-line argument parsing
collections # Advanced data structures
threading # Multi-threading support
time # Time-based operations# Clone the repository
git clone https://github.com/th-shivam/RTDS.git
cd RTDS
# Install dependencies
pip install -r requirements.txt# Grant necessary permissions
chmod +x rtds.py
# Run with administrative privileges
sudo python3 rtds.py
# Custom configuration
sudo python3 rtds.py --ddos-threshold 100 --iface eth0# Open PowerShell as Administrator
cd C:\Path\To\RTDS
# Execute the Windows version
python rtds_win.py
# Monitor specific interface
python rtds_win.py --iface "Wi-Fi" --log "security.log"python rtds.py [OPTIONS]
OPTIONS:
--ddos-threshold INT DDoS detection threshold (default: 100 pps)
--syn-threshold INT SYN flood threshold (default: 50 pps)
--iface STRING Network interface to monitor
--log STRING Custom log file path
--help Show help message# High-security monitoring
python rtds.py --ddos-threshold 50 --syn-threshold 25
# Monitor specific network interface
python rtds.py --iface "Ethernet" --log "network_security.log"
# Corporate network monitoring
sudo python3 rtds.py --ddos-threshold 200 --iface eth0๐ Simple RTDS v1.0 - DDoS & MITM Detection
๐ก๏ธ Focused Detection: DDoS Attacks & MITM/ARP Spoofing
๐ฏ Project Ready Version
--------------------------------------------------
Detection Features:
โข Volumetric DDoS Detection โข SYN Flood Detection
โข ARP Spoofing Detection โข MITM Attack Detection
โข Real-time Monitoring โข Automatic Logging
--------------------------------------------------
[*] Interface: Wi-Fi
[*] DDoS Threshold: 100 pps
[*] SYN Threshold: 50 pps
[*] Log File: rtds_alerts.log
โ New device mapped: 192.168.1.100 โ aa:bb:cc:dd:ee:ff
๐จ DDoS Attack Detected from 192.168.1.50 - Rate: 150 packets/sec
โ ๏ธ MITM/ARP Spoofing Detected! IP: 192.168.1.1 | Old MAC: aa:bb โ New MAC: cc:dd
๐ Runtime: 00:02:30 | Packets: 1500 | Attacks: 3 | ARP Entries: 15
๐ MITM Attack Detection
Scenario: ARP Spoofing Attack
Target: Router (192.168.1.1)
Attacker: Malicious device attempts MAC spoofing
Detection: Real-time ARP table analysis
Alert: "MITM/ARP Spoofing Detected!"
๐ฅ DDoS Attack Detection
Scenario: SYN Flood Attack
Target: Web server (192.168.1.10)
Attack: High-rate SYN packet flooding
Detection: Packet rate threshold analysis
Alert: "DDoS Attack Detected - Rate: 250 pps"
- DDoS Detection Engine
- MITM/ARP Spoofing Detection
- Real-time Monitoring Dashboard
- Cross-platform Compatibility
- ๐ญ Port Scanning Detection
- ๐ DNS Tunneling Analysis
- ๐ Encrypted Traffic Analysis
- ๐ค Machine Learning Integration
- ๐ฑ Web-based Dashboard
- ๐ Email/SMS Alerting
- ๐ Advanced Analytics
- ๐ Distributed Monitoring
We welcome contributions from the cybersecurity community!
- ๐ด Fork the repository
- ๐ฑ Create a feature branch (
git checkout -b feature/AmazingFeature) - ๐พ Commit your changes (
git commit -m 'Add AmazingFeature') - ๐ค Push to the branch (
git push origin feature/AmazingFeature) - ๐ Open a Pull Request
Found a bug? Please create an issue with:
- Detailed description
- Steps to reproduce
- Expected vs actual behavior
- System information
MIT License
Copyright (c) 2024 RTDS Project
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
Educational Purpose: This tool is designed for educational and research purposes in cybersecurity. Users are responsible for ensuring compliance with applicable laws and regulations. The developers are not responsible for any misuse of this software.