About System

CyberSentinel - System for monitoring confidential data movement in computer networks

Dissertation Topic

Developed based on PHD dissertation on "Algorithms and Models for Monitoring Confidential Data Movement in Computer Networks".

Main Goal

To develop perfect algorithms and models for real-time monitoring of confidential data movement in computer networks.

Scientific Innovation

  • Real-time monitoring algorithms (85% innovation)
  • Confidential data detection algorithms (90% innovation)
  • Network protocol analysis algorithms (80% innovation)
  • Data flow control algorithms (75% innovation)
  • Security algorithms (88% innovation)

Practical Significance

The system plays an important role in protecting confidential data for corporations, government agencies and individual users.

Research Background

PhD Dissertation

System developed on scientific basis. Dissertation defended in 2024.

Scientific Research

Algorithms and models created as a result of 3-year deep scientific research.

Scientific Publications

Developments presented at international conferences and patented.

System Architecture

Main Components

  • Real-time Monitoring Engine - Real-time network traffic monitoring
  • AI Classification Engine - Confidential data detection
  • Protocol Analysis Engine - Network protocol analysis
  • Data Flow Control Engine - Data flow management
  • Security Engine - Security algorithms
System Architecture

Admin Panel

Extensive capabilities for system administrators

System Login

  • Secure admin panel access
  • Two-factor authentication
  • Biometric authentication
  • SSO (Single Sign-On) support

Search Engine Blocking

  • Block Google search
  • Block Yandex search
  • Block Bing search
  • Block other search engines
  • Monitor search queries

Classification Models

  • Select Machine Learning models
  • Configure AI algorithms
  • Optimize model parameters
  • Train new models
  • Evaluate model performance

Database Management

  • Train new databases
  • Update database
  • Clean data
  • Backup and restore
  • Data migration

User Management

  • Add, delete, edit users
  • Manage roles and permissions
  • Monitor user activity
  • View login history
  • User statistics

Real-time Monitoring

  • Monitor network traffic
  • View blocked packets
  • Monitor security events
  • System performance monitoring
  • Alerts and notifications

Confidential Data Monitoring

  • How much confidential data each user has
  • Confidential data analysis
  • Monitor data movement
  • Assess security level
  • Detailed reports

Client Key Generation

  • Generate keys for clients
  • Corporate key generation
  • Individual key generation
  • Set key expiration
  • Manage key permissions

System Settings

  • Configure algorithm parameters
  • System configuration
  • Security settings
  • Manage log files
  • System updates

Admin Panel Screenshots

Admin Dashboard

Admin Dashboard

Search Blocking

Search Engine Blocking

ML Models

Classification Models

Database Management

Database Management

User Management

User Management

Real-time Monitoring

Real-time Monitoring

Confidential Data

Confidential Data Monitoring

Key Generation

Client Key Generation

Client Panel

Convenient interface for users

System Login

Launch client application and connect to server

  • Login page opens
  • Enter server IP address
  • Enter key (password)
  • Connect to server

Data Scanning

Read all data on user device

  • Scan all files on computer or phone
  • Analyze data content
  • Identify file types
  • Calculate data volume

Confidentiality Level Classification

Analyze data using AI algorithms

  • Identify confidential data
  • Set security level
  • Categorize data
  • Set security level

File Monitoring

Monitor creation of new files or changes to existing files

  • Monitor new file creation
  • Monitor existing file changes
  • Monitor file activity
  • Automatic checking

Rescan

Rescan changed files

  • Identify changed files
  • Re-analyze confidentiality
  • Set new security level
  • Continuous monitoring

Continuous Operation

System continuously operates and monitors

  • Background operation
  • Continuous monitoring
  • Automatic updates
  • Server synchronization

Client Panel Screenshots

Client Login

System Login

Data Scanning

Data Scanning

Classification

Confidentiality Classification

File Monitoring

File Monitoring

Rescan

Rescan

Background Process

Background Process

Technology Stack

Built on modern technologies

Programming Languages

C++ Python SQL GO PHP Kotlin JavaScript

Frameworks and Libraries

Scikit-learn TensorFlow Scapy Flask

Databases

MySQL Redis Elasticsearch

Cloud Platforms

AWS Azure Google Cloud