8000 GitHub - nazeh643/flowhawk: FlowHawk is an open-source network security monitoring platform that uses eBPF for efficient packet processing. It offers real-time visibility into network traffic and helps identify security threats quickly. πŸ¦…πŸŒ
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

FlowHawk is an open-source network security monitoring platform that uses eBPF for efficient packet processing. It offers real-time visibility into network traffic and helps identify security threats quickly. πŸ¦…πŸŒ

License

Notifications You must be signed in to change notification settings

nazeh643/flowhawk

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

35 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Flowhawk πŸ¦…

Flowhawk Logo

Welcome to Flowhawk, a powerful real-time eBPF-powered network security monitor designed to detect and analyze threats with precision and speed. Our tool harnesses the power of AI to identify port scans, DDoS attacks, botnet activity, and other anomalies at speeds exceeding 100Gbps, with sub-microsecond latency. Flowhawk processes around 150 million packets per second, making it a robust solution for modern cybersecurity challenges.

Table of Contents

Features 🌟

  • Real-time Monitoring: Detect threats as they happen, ensuring immediate response to potential breaches.
  • eBPF Technology: Utilize extended Berkeley Packet Filter (eBPF) for efficient packet processing and analysis.
  • AI-Driven Threat Detection: Employ machine learning techniques to identify and classify anomalies in network traffic.
  • High Throughput: Handle over 100Gbps of network traffic with low latency, ensuring no packets are lost.
  • Comprehensive Threat Detection: Identify a range of threats including:
    • Port Scans
    • DDoS Attacks
    • Botnet Activity
    • Zero-Day Exploits
  • User-Friendly Interface: Simple and intuitive dashboard for monitoring and analysis.
  • Customizable Alerts: Set alerts for specific types of traffic or anomalies.

Installation βš™οΈ

To get started with Flowhawk, you need to download the latest release. You can find it here. Download the appropriate file for your system and follow the installation instructions below.

Prerequisites

  • Go programming language (version 1.16 or later)
  • Access to a Linux environment with eBPF support
  • Root privileges to run Flowhawk

Steps to Install

  1. Download the Release: Visit the Releases section and download the latest version.
  2. Extract the Package: Unzip the downloaded file.
  3. Build the Project: Navigate to the directory and run the following command:
    go build
  4. Run Flowhawk: Execute the binary with root privileges:
    sudo ./flowhawk

Usage πŸ“Š

Once installed, you can start using Flowhawk to monitor your network. The following sections outline basic commands and configurations.

Starting Flowhawk

To start monitoring, simply run:

sudo ./flowhawk start

Configuration

Flowhawk allows for customizable settings. You can modify the configuration file located at config.yaml. Here are some key parameters:

  • alert_threshold: Set the threshold for alerts.
  • monitoring_interfaces: Specify which network interfaces to monitor.
  • logging_level: Choose the verbosity of logs (info, debug, error).

Viewing Results

After starting Flowhawk, you can access the dashboard via your web browser at http://localhost:8080. The dashboard provides real-time visualizations of network traffic, detected threats, and system performance.

Architecture πŸ—οΈ

Flowhawk is built on a robust architecture that leverages several key components:

  • eBPF Programs: These programs run in the Linux kernel and filter packets efficiently.
  • Data Collection: Flowhawk collects and processes network data in real-time.
  • Machine Learning Models: AI algorithms analyze the data for threat detection.
  • User Interface: A web-based dashboard displays insights and alerts.

Data Flow

  1. Packet Capture: eBPF captures packets at the kernel level.
  2. Data Processing: Flowhawk processes the data using machine learning models.
  3. Alert Generation: The system generates alerts based on detected anomalies.
  4. User Notification: Users receive notifications through the dashboard.

Contributing 🀝

We welcome contributions from the community! If you would like to help improve Flowhawk, please follow these steps:

  1. Fork the Repository: Click the "Fork" button on GitHub.
  2. Create a Branch: Use a descriptive name for your branch:
    git checkout -b feature/YourFeatureName
  3. Make Changes: Implement your feature or fix.
  4. Commit Your Changes: Write a clear commit message:
    git commit -m "Add new feature"
  5. Push to Your Branch:
    git push origin feature/YourFeatureName
  6. Open a Pull Request: Go to the original repository and click "New Pull Request".

License πŸ“„

Flowhawk is licensed under the MIT License. See the LICENSE file for details.

Support πŸ™‹β€β™‚οΈ

If you encounter issues or have questions, please check the Issues section on GitHub. You can also reach out via email or open a discussion.


Thank you for checking out Flowhawk! For the latest updates, visit the Releases section regularly. Your feedback and contributions are invaluable to us.

About

FlowHawk is an open-source network security monitoring platform that uses eBPF for efficient packet processing. It offers real-time visibility into network traffic and helps identify security threats quickly. πŸ¦…πŸŒ

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Contributors 3

  •  
  •  
  •  
0