KernelTrace AI is a proactive security agent that monitors system calls directly from the Linux kernel and uses machine learning to identify suspicious process behavior.#360
Open
Skip06 wants to merge 8 commits intolibbpf:masterfrom
Conversation
Member
|
@Skip06 libbpf-bootstrap is meant as a collection of minimal and simple examples to get people started, it's not really a repository of tools. Looking at BPF bits, it's not that much different from bootstrap example, so I don't think we should land it. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
KernelTrace AI: Real-time eBPF Anomaly Detection
KernelTrace AI is a professional-grade security monitor that bridges the gap between low-level Linux kernel tracing and high-level machine learning. It uses eBPF to capture system calls in real-time and a Scikit-Learn AI model to detect suspicious patterns without relying on traditional virus signatures.
Architecture & Stack
This project implements a full-stack security pipeline:
sys_enter_openatto monitor file access.The AI Intelligence (Sliding Window & Normalization)
To handle "noisy" applications like Spotify or Zen Browser, the AI uses two advanced techniques:
.sqlite-walor cache blobs), allowing the AI to learn structural patterns instead of specific files.Getting Started
Prerequisites
libbpf-devel, Python 3.10+, and BunInstallation & Run
Build the Kernel Component:
Start the Engine:
View Dashboard:
Open
http://localhost:3000in your browser.Security Simulation (The Red Team Test)
The effectiveness of the detector was verified by simulating a "zero-day" attack:
~/.vault/hidden/keys/v1/) and performing rapid file touches.Project Structure
spy.bpf.c: The eBPF C code that runs in the kernel.spy.c: The user-space loader that reads from the Ring Buffer.brain.py: The Scikit-Learn Isolation Forest implementation.server.ts: The Bun/TypeScript WebSocket server.index.html: The real-time "Matrix-style" dashboard UI.License
MIT License - Created for educational and security research purposes.