AI-Powered Security Operations Center
Your tireless SOC analyst β detecting threats, correlating events, responding automatically.
Traditional SIEMs are expensive, complex, and require a team to operate. Sentinel combines statistical anomaly detection, Sigma-compatible rule matching, threat intelligence feeds, and LLM-powered analysis into a single self-hosted platform that works out of the box.
Think: Splunk + CrowdStrike + an AI analyst β self-hosted, open-source, and free.
- π₯ Real-time Log Ingestion β Syslog (UDP/TCP), file watching, network capture, API collectors
- π§ AI-Powered Analysis β LLM interprets suspicious patterns and explains threats in plain language
- π Anomaly Detection β Statistical (z-score, IQR), behavioral baselines, brute force, port scan, exfiltration, privilege escalation detection
- π Rule Engine β YAML-based Sigma-compatible rules with 20+ built-in detections
- π Threat Intelligence β AbuseIPDB, AlienVault OTX feeds, IOC checking, dark web monitoring
- β‘ Automated Response β IP blocking, process killing, host isolation, webhook/WhatsApp alerts, incident ticketing
- π Event Correlation β Links related events across configurable time windows
- π― Live Dashboard β Dark-themed real-time UI with event stream, threat gauge, geographic attack map, alert timeline
- π REST API β Full Flask API for integration with existing tooling
git clone https://github.com/juliosuas/sentinel.git && cd sentinel
cp .env.example .env # Add your API keys
docker-compose up -d # β http://localhost:8080Local install:
pip install -r requirements.txt && make run
Screenshots coming soon β live dashboard, attack map, alert timeline, incident response
ββββββββββββββββββββ
β Collectors β
β syslog β file β
β network β api β
ββββββββββ¬ββββββββββ
β
βΌ
ββββββββββββββββββββ
β SentinelEngine β
β (core/engine) β
ββββββββββ¬ββββββββββ
β
βββββββββββββββΌββββββββββββββ
βΌ βΌ βΌ
βββββββββββββ βββββββββββββ βββββββββββββ
β Anomaly β β Rules β β Correlatorβ
β Detector β β (Sigma) β β (linking) β
βββββββ¬ββββββ βββββββ¬ββββββ βββββββ¬ββββββ
βββββββββββββββΌββββββββββββββ
βΌ
ββββββββββββββββββββ
β AI Analyzer β
β (LLM analysis) β
ββββββββββ¬ββββββββββ
βΌ
ββββββββββββββββββββ
β Responder β
β block β alert β
β isolate β ticket β
ββββββββββ¬ββββββββββ
βΌ
ββββββββββββββββββββ
β Flask API + β
β Live Dashboard β
ββββββββββββββββββββ
Sentinel ships with 20+ detection rules including:
| Rule | Description | MITRE ATT&CK |
|---|---|---|
| SSH Brute Force | Multiple failed SSH logins from same IP | T1110 |
| Login Spray | Failed logins across multiple accounts | T1110.003 |
| Privilege Escalation | sudo/su abuse, unauthorized root access | T1548 |
| Port Scan | Sequential port probing detection | T1046 |
| Data Exfiltration | Large outbound data transfers | T1041 |
| Web Shell | Known web shell pattern detection | T1505.003 |
| Crontab Modification | Unauthorized scheduled task changes | T1053 |
| Suspicious DNS | DNS queries to known malicious domains | T1071.004 |
| New User Creation | Unauthorized user account creation | T1136 |
| Process Injection | Suspicious process execution chains | T1055 |
| Method | Endpoint | Description |
|---|---|---|
GET |
/api/events |
List events (with filters) |
GET |
/api/alerts |
List alerts |
GET |
/api/incidents |
List incidents |
POST |
/api/incidents |
Create incident |
PATCH |
/api/incidents/<id> |
Update incident |
GET |
/api/stats |
Dashboard statistics |
GET |
/api/threats |
Threat intel data |
POST |
/api/respond |
Trigger response action |
Copy .env.example to .env and configure:
| Variable | Description |
|---|---|
ANTHROPIC_API_KEY |
AI-powered analysis |
ABUSEIPDB_API_KEY |
IP reputation lookups |
OTX_API_KEY |
AlienVault OTX threat intel |
WEBHOOK_URL |
Alert webhook URL |
WHATSAPP_API_* |
WhatsApp alerting |
DASHBOARD_PORT |
Dashboard port (default: 8080) |
| Feature | Sentinel | Splunk | Wazuh | OSSEC |
|---|---|---|---|---|
| AI-powered analysis | β LLM | β | β | β |
| Self-hosted | β | β | β | β |
| Cost | β Free/OSS | β $$$$$ | β Free | β Free |
| Sigma rules | β | β Plugin | β | β |
| Auto-response | β | β SOAR $$ | ||
| Setup time | ~5 min | Days | Hours | Hours |
| Threat intel feeds | β Built-in | β Add-on | β | β |
Sentinel's AI-powered analysis includes built-in verification to ensure detection accuracy and reduce false positives.
| Detection Type | Verification Method | Success Criteria |
|---|---|---|
| Brute Force | Threshold confirmation | β₯5 failed attempts from same IP within 5 minutes |
| Port Scan | Sequential port analysis | β₯10 unique ports probed from single source within 60 seconds |
| Data Exfiltration | Volume anomaly check | Outbound transfer exceeds 3Ο from baseline for the source |
| Privilege Escalation | Context chain validation | Process ancestry shows unprivileged β privileged transition |
| Web Shell | Signature + behavior match | File hash OR behavioral pattern (POST β command execution) |
| Lateral Movement | Multi-host correlation | Same credentials used across β₯2 hosts within correlation window |
Every AI-generated analysis includes a confidence score and evidence chain:
| Confidence Level | Score Range | AI Action | Human Action Required |
|---|---|---|---|
| π΄ High | 85-100% | Auto-respond (block/isolate) | Post-incident review |
| π‘ Medium | 50-84% | Alert with analysis | Review and decide |
| π’ Low | 20-49% | Log with context | Periodic batch review |
| βͺ Informational | 0-19% | Enrich event metadata | No action needed |
When adding or tuning detection rules, verify:
- Rule triggers on known-bad test data (true positive validation)
- Rule does NOT trigger on known-good traffic (false positive check)
- MITRE ATT&CK technique mapping is accurate
- Alert severity matches potential business impact
- Correlation window is appropriate for the attack type
- AI analysis provides actionable context (not just "suspicious activity detected")
- Automated response action is proportional to confidence level
| Platform | Architecture | Status | Notes |
|---|---|---|---|
| Ubuntu 22.04+ | x86_64, ARM64 | β Full | Recommended for production |
| Debian 12+ | x86_64, ARM64 | β Full | Stable and tested |
| CentOS Stream 9 | x86_64 | β Full | Enterprise environments |
| Rocky Linux 9 | x86_64 | β Full | RHEL-compatible |
| macOS 13+ | ARM64, x86_64 | Development/testing only β limited syslog support | |
| Docker | Any | β Full | docker-compose up -d β production ready |
| Kubernetes | Any | β Full | Helm chart available |
| Raspberry Pi OS | ARM64 | Suitable for small network monitoring | |
| Windows Server | x86_64 (WSL2) | Use Docker or WSL2 |
| Integration | Protocol | Status | Notes |
|---|---|---|---|
| Syslog (RFC 5424) | UDP/TCP | β Full | Primary log ingestion |
| Syslog (RFC 3164) | UDP/TCP | β Full | Legacy format supported |
| File watching | inotify/kqueue | β Full | Log file tail monitoring |
| AbuseIPDB | REST API | β Full | IP reputation lookups |
| AlienVault OTX | REST API | β Full | Threat intelligence feeds |
| Slack | Webhook | β Full | Alert notifications |
| API | β Full | Alert notifications | |
| Generic Webhook | HTTP POST | β Full | Custom integrations |
| Sigma Rules | YAML | β Full | Detection rule format |
| MITRE ATT&CK | Framework | β Full | Technique mapping |
| Provider | Status | Notes |
|---|---|---|
| Anthropic Claude | β Recommended | Best analysis quality |
| OpenAI GPT-4 | β Supported | Good analysis quality |
| Local LLMs (Ollama) | Reduced analysis depth |
make install # Install dependencies
make test # Run test suite
make run # Start full platform
make run-syslog # Start with syslog collector
make run-filewatcher # Start with file watcherContributions are welcome! Here's how to get started:
- Fork the repository
- Create a feature branch (
git checkout -b feature/new-detection) - Commit your changes (
git commit -m 'Add new detection rule') - Push to the branch (
git push origin feature/new-detection) - Open a Pull Request
Check the issues tab for areas where help is needed β especially new detection rules and collector plugins.
Sentinel is designed for authorized security monitoring of systems you own or have explicit permission to monitor. Unauthorized interception or monitoring of network traffic may violate local, state, and federal laws. The authors assume no liability for misuse. Ensure compliance with all applicable laws and organizational policies before deployment.
MIT
Sentinel β Because threats don't sleep, and neither should your SOC. π
AI Garden β A living world built exclusively by AI agents. Watch it grow.
Sentinel's AI doesn't just detect β it proves its work. Every alert includes a confidence score, correlation evidence, and plain-language explanation reviewed against statistical baselines.
See docs/ai-analysis-verification.md for the full verification methodology.
| Metric | Target | Method |
|---|---|---|
| False Positive Rate | <5% | Monthly 100-alert audit |
| Detection Coverage | >90% MITRE ATT&CK | Atomic red team testing |
| Alert-to-Action | <15 min (critical) | Automated SLA tracking |
| AI Explanation Accuracy | >95% | Analyst feedback loop |