KernelTrace AI is a proactive security agent that monitors system calls directly from the Linux kernel and uses machine learning to identify suspicious process behavior. #360
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
KernelTrace AI: Real-time eBPF Anomaly Detection
KernelTrace AI is a professional-grade security monitor that bridges the gap between low-level Linux kernel tracing and high-level machine learning. It uses eBPF to capture system calls in real-time and a Scikit-Learn AI model to detect suspicious patterns without relying on traditional virus signatures.
Architecture & Stack
This project implements a full-stack security pipeline:
sys_enter_openatto monitor file access.The AI Intelligence (Sliding Window & Normalization)
To handle "noisy" applications like Spotify or Zen Browser, the AI uses two advanced techniques:
.sqlite-walor cache blobs), allowing the AI to learn structural patterns instead of specific files.Getting Started
Prerequisites
libbpf-devel, Python 3.10+, and BunInstallation & Run
Build the Kernel Component:
Start the Engine:
View Dashboard:
Open
http://localhost:3000in your browser.Security Simulation (The Red Team Test)
The effectiveness of the detector was verified by simulating a "zero-day" attack:
~/.vault/hidden/keys/v1/) and performing rapid file touches.Project Structure
spy.bpf.c: The eBPF C code that runs in the kernel.spy.c: The user-space loader that reads from the Ring Buffer.brain.py: The Scikit-Learn Isolation Forest implementation.server.ts: The Bun/TypeScript WebSocket server.index.html: The real-time "Matrix-style" dashboard UI.License
MIT License - Created for educational and security research purposes.