diff --git a/submissions/CodeGuardians_NetShield.md b/submissions/CodeGuardians_NetShield.md new file mode 100644 index 0000000..37c7c65 --- /dev/null +++ b/submissions/CodeGuardians_NetShield.md @@ -0,0 +1,174 @@ + +

+ + CoC Inheritance 2025 + +
+ NetShield: AI-Powered Shield Against Digital Threats +

+ +
+By Team Code Guardians +
+
+ +
+Table of Contents + +- [Description](#-description) +- [Links](#-links) +- [Tech Stack](#-tech-stack) +- [Progress](#-progress) +- [Future Scope](#-future-scope) +- [Applications](#-applications) +- [Project Setup](#-project-setup) +- [Team Members](#-team-members) +- [Mentors](#-mentors) + +
+ +## 📝 Description + +NetShield is a comprehensive cybersecurity command center designed to protect users from modern digital threats. It unifies advanced detection engines for identifying AI-generated deepfakes, phishing attacks, and malicious URLs into a single, intuitive platform, bridging the gap between sophisticated AI models and everyday user safety. + +## 🔗 Links + +- [GitHub Repository](https://github.com/athrvas017/Code_Guardians) +- [Demo Video](https://drive.google.com/drive/folders/1dVyEsKwROaDJ4tRXqUwdbtWY4HUjXxSL?usp=sharing) +- [Project Screenshots/Drive](https://drive.google.com/drive/folders/1HvrXofSExR4bGeJy7EzlTZEwDSUbz-35) +- [Hosted Website](https://netshield-67le.onrender.com/) + +## 🤖 Tech-Stack + +### System Architecture + +```mermaid +graph TD + User([User/Source]) --> WebUI[Frontend Static Pages] + User --> BrowserExt[Chrome Extension MV3] + + WebUI --> API[Flask Backend] + BrowserExt --> API + + API --> URLModel[URL ML Model - scikit-learn] + API --> PhishModel[Phishing Text Model - scikit-learn + TF-IDF] + API --> SafeBrowsing[Google Safe Browsing API] + API --> AIDetect[Hugging Face Inference via gradio_client] + + WebUI --> PwnedAPI[HaveIBeenPwned Password API] + + URLModel --> Out([Security Verdict & Risk Insights]) + PhishModel --> Out + AIDetect --> Out +``` + +### Front-end (`frontend/`) +- **HTML5 Pages**: Multi-page interface in `frontend/pages` (index, password toolkit, awareness, AI detection, command analysis). +- **Vanilla JavaScript**: Feature logic in `frontend/js` (password generation, breach check, and utilities). +- **CSS3**: Shared styles in `frontend/css/style.css` and assets in `frontend/assets`. + +### Browser Extension (`extension/`) +- **Chrome Extension Manifest V3**: `extension/manifest.json` with service worker architecture. +- **Extension Modules**: Background worker, content scripts, popup UI, and utility scripts under `extension/background`, `extension/content`, `extension/popup`, and `extension/utils`. + +### Back-end (`backend/`) +- **Flask (Python 3)**: Central web server and routes in `backend/app.py` with modular services under `backend/services`. +- **Gunicorn + Procfile**: Production serving and deployment support (`backend/gunicorn_config.py`, `backend/Procfile`, `backend/vercel.json`). +- **Environment Configuration**: `python-dotenv` for API keys and runtime configuration. + +### ML / AI +- **URL & Phishing Models**: scikit-learn models and vectorizers stored as `.pkl` files in `backend/model` and loaded via `joblib`. +- **Feature/Training Utilities**: Model training scripts and feature engineering in `backend/utils`. +- **AI Image Detection Service**: Hugging Face endpoint integration through `gradio_client` in `backend/services/ai_image_detection.py`. + +### External Integrations +- **Google Safe Browsing API**: URL reputation verification in backend safety services. +- **HaveIBeenPwned API (k-Anonymity range API)**: Password breach checks used by the password toolkit. +## 📈 Progress + +### Fully Implemented Features + +* **AI Image Detection** + Detects deepfake and AI-generated images using a ResNet-18 model by analyzing pixel artifacts and frequency patterns. + +* **URL Safety Scanner** + Uses machine learning-based lexical analysis along with Google Safe Browsing API to identify malicious and phishing websites. + +* **Phishing Email Detector** + Applies NLP techniques (TF-IDF + Naive Bayes) to detect social engineering attacks and automatically scans embedded links. + +* **Dangerous Command Analysis** + Identifies harmful shell commands such as file deletion, privilege escalation, and fork bombs, and provides security warnings. + +* **Password Toolkit** + Generates strong passphrases and checks password leaks securely using k-Anonymity and breach databases. + +* **Browser Extension** + Real-time Chrome Extension that scans URLs, detects login fields, and provides instant security alerts. + + +--- + +### Partially Implemented Features / Work in Progress + +* **Database Layer Integration**: Migrating module outputs and user security events to a centralized database for reliable storage, querying, and analytics. +* **Password Manager Module (In Progress)**: Building a secure vault workflow for storing, generating, and auto-filling credentials with encrypted persistence. + +## 🔮 Future Scope + +* **Advanced Password Manager**: Full-featured encrypted credential vault with breach alerts, password health scoring, and cross-device sync support. +* **URL Model Enhancement**: Improving malicious URL detection with larger datasets, richer feature engineering, and continuous model retraining. +* **AI Image Model Enhancement**: Upgrading deepfake detection with newer architectures, multimodal validation signals, and better robustness against adversarial manipulation. + +## 💸 Applications + +1. **Consumer Privacy** - Protecting individuals from identity theft and social engineering fraud. +2. **Corporate Security** - Enhancing employee protection against sophisticated Business Email Compromise (BEC). +3. **Media Verification** - Providing tools for journalists and users to verify the authenticity of online imagery. + +## 🛠 Project Setup + +1. Clone the GitHub repo. +```bash +git clone https://github.com/athrvas017/Code_Guardians.git +``` + +2. Create and activate a Virtual Environment. +```bash +python -m venv venv +# Windows +.\venv\Scripts\activate +# Linux/macOS +source venv/bin/activate +``` + +3. Install dependencies. +```bash +pip install -r requirements.txt +``` + +4. Download ML models and data. +Place the `models` folder and relevant datasets in the `backend/` directory. (Link available in 🔗 Links). + +5. Start the Flask application. +```bash +cd backend +python app.py +``` + +## 👨‍💻 Team Members + +* **Athrva Sarade**: [GitHub Profile](https://github.com/athrvas017) +* **Niranjan patil**: [GitHub Profile](https://github.com/niranjanpatil1010) +* **Ajay Payer**: [GitHub Profile](https://github.com/ajaypayer) +* **Om chavarkar**: [GitHub Profile](https://github.com/Blaster1011) + + +## 👨‍🏫 Mentors + +* **[Sarakshi Mamodia]**: [GitHub Profile](https://github.com/smamodia) [LinkedIn](https://www.linkedin.com/in/sarakshi-mamodia-6702682a3?utm_source=share&utm_campaign=share_via&utm_content=profile&utm_medium=ios_app) +* **[Prachi Chavhan]**: [GitHub Profile](https://github.com/Pxchavhan) [LinkedIn](https://www.linkedin.com/in/pchavhan) + + + +