AI CyberLog Analyzer (CyberGuard) is a futuristic SOC (Security Operations Center) style cybersecurity dashboard that analyzes log files, detects suspicious activities, and visualizes threats in real-time using an eye-catching cyber-themed interface.
It is designed for: - π΅ Blue Team Learning - π°οΈ SOC Dashboard Simulation - π Log Intelligence & Threat Detection - π Cybersecurity Portfolio Projects
The system supports multi-format log parsing, AI-driven insights, MITRE ATT&CK mapping, and real-time cyber threat visualization.
flowchart TD
A[User Uploads Log File] --> B[Frontend Dashboard Interface]
B --> C[File Validation and Preprocessing]
C --> D[Backend Analysis API]
D --> E[Log Processing Engine]
E --> F[Log Parsing Module]
E --> G[Feature Extraction Module]
E --> H[Metadata and Pattern Analysis]
F --> I[AI Analysis Engine]
G --> I
H --> I
I --> J[Anomaly and Threat Detection]
J --> K[Risk Classification Layer]
K --> L[Analysis Report Generator]
L --> M[Database Storage]
M --> N[Log Records and Analysis History]
L --> O[JSON Response to Frontend]
O --> P[Visualization Dashboard]
P --> Q[Threat Insights Panels]
P --> R[Charts and Log Statistics]
P --> S[Alert and Anomaly Reports]
Users can upload logs in multiple formats: - .log - .txt - .json -
.csv - Apache/Nginx access logs
OR use live stream simulation for real-time SOC experience.
Built using: - React + Vite - Tailwind CSS (Cyber Theme) - Recharts (Data Visualization) - Framer Motion (Animations)
Main Modules: - Dashboard (Threat Analytics) - Upload Logs Panel - Live Stream Viewer - AI Analysis Section - MITRE ATT&CK Mapping Panel - Recent Analysis Sessions
The backend handles: - Secure file uploads - REST API communication - Log analysis orchestration - Real-time data processing - Threat detection routing
The parser extracts key attributes: - Timestamp - IP Address - Event Type - Status Codes - Users & Endpoints
Detection Methods: - Regex pattern matching - Frequency analysis - Behavioral correlation - Event classification
Detects: - π΄ Brute Force Attacks (Multiple failed logins) - π
Credential Stuffing - π‘ Unauthorized Access (401/403) - π£ DDoS
Patterns (Request spikes) - π΅ IP Anomalies -
Example Rule: IF failed_logins_from_same_IP > 5 within 60 seconds
β Flag as Brute Force Attack (HIGH Severity)
Provides intelligent insights: - Automated threat summaries - Risk scoring - Behavior explanation - Human-readable cyber analysis
Example Output: "Possible brute force attack detected from IP 185.243.44.12 with multiple failed login attempts within a short time window."
Why SQLite: - No external DB setup - Lightweight & portable - Auto-created on first run - Perfect for GitHub cloning - No MongoDB / No Supabase
Stored Data: - Uploaded Logs - Threat Results - Analysis Sessions - IP Activity Metrics
Displayed Analytics: - Threat Severity Pie Chart - Top IP Activity Graph - Threat Breakdown Chart - Unique IP Counter - Logs Processed Counter - Recent Threat Table
| Attack Type | MITRE ID | Description |
|---|---|---|
| Brute Force | T1110 | Credential Guessing |
| Unauthorized Access | T1078 | Valid Accounts Abuse |
| DDoS Pattern | T1498 | Network Denial of Service |
| Privilege Escalation | T1068 | Exploitation for Privilege |
git clone https://github.com/LoganthP/AI-CyberLog-Analyzer.git
cd AI-CyberLog-Analyzer
npm install
npm run devβ‘ SQLite database auto-generates on first run (Zero configuration required)
- π€ Smart Log Upload β Drag & drop
.log,.txt,.json,.csvfiles with preview - π‘ Real-Time Streaming β WebSocket-based SIEM-style live log feed with terminal UI
- π§ AI Anomaly Detection β Rule + heuristic hybrid engine with natural-language summaries
- π‘οΈ MITRE ATT&CK Mapping β Auto-map threats to framework techniques with visual badges
- π Interactive Analytics β Recharts-powered dashboards with pie, bar, and line charts
| Threat Type | Description | MITRE ID |
|---|---|---|
| Brute Force Attack | >5 failed logins from same IP in 60s | T1110 |
| DDoS Pattern | >100 requests/min from single IP | T1498 |
| Exploit Attempt | SQL injection, XSS, path traversal | T1190 |
| Reconnaissance | Directory/service scanning | T1046 |
| Unauthorized Access | Repeated admin panel probing | T1133 |
| Suspicious Tool | Known scanner user-agents (Nikto, sqlmap, Nmap) | T1595 |
| Auth Failures | Clusters of 401/403 responses | T1078 |
- π Futuristic cyber-dark theme (#0A0F1F)
- β¨ Neon glow accents (cyan, purple, blue)
- π² Glassmorphism cards with backdrop blur
- π¬ Framer Motion animations throughout
- π Terminal-style live log viewer
- π± Fully responsive design
cyber-log-analyzer/
βββ client/ # React Frontend
β βββ src/
β β βββ components/ # Layout, Sidebar, ThreatBar
β β βββ pages/ # Dashboard, Upload, LogStream, Analysis, MitreAttack
β β βββ hooks/ # useWebSocket custom hook
β β βββ utils/ # Axios API client
β β βββ App.jsx # Router + routes
β β βββ main.jsx # Entry point
β β βββ index.css # Global styles + cyber theme
β βββ tailwind.config.js # Custom theme config
β βββ vite.config.js # Vite + proxy config
β βββ package.json
βββ server/ # Express Backend
β βββ routes/
β β βββ logs.js # API endpoints
β βββ db.js # SQLite setup + MITRE seeding
β βββ index.js # Server entry point
β βββ package.json
βββ parser/ # Detection Engine
β βββ logParser.js # Multi-format log parser
β βββ detectionEngine.js # 7 threat detection rules
β βββ aiAnalyzer.js # AI analysis + risk scoring
βββ websocket/
β βββ streamManager.js # WebSocket + simulated stream
βββ database/
β βββ schema.sql # Reference SQL schema
β βββ sample.log # Test log file
β βββ logs.db # Auto-generated SQLite DB
βββ .env.example # Environment template
βββ .gitignore
βββ package.json # Root scripts
βββ README.md
| Layer | Technology | Purpose |
|---|---|---|
| Frontend | React 18 + Vite | Fast development & build |
| Styling | Tailwind CSS | Utility-first cyber theme |
| Animations | Framer Motion | Smooth micro-interactions |
| Charts | Recharts | Interactive data visualization |
| Icons | Lucide React | Consistent icon system |
| Backend | Node.js + Express | REST API server |
| Real-time | WebSocket (ws) | Live log streaming |
| Database | SQLite (better-sqlite3) | Zero-config portable DB |
| Security | Helmet + Rate Limiter | API hardening |
- Secure file validation
- Async log parsing (high performance)
- Large log file support
- Modular scalable architecture
- Robust error handling
- Real-time WebSocket Log Streaming
- AI Threat Explanation (LLM Integration)
- PDF Threat Report Export
- Geo-IP Visualization Map
- Machine Learning Anomaly Detection
- Alert Notification System