About Us

DeepGuardian is an advanced Network Intrusion Detection System designed to safeguard your network by identifying and mitigating security threats in real time. This approach focusses on the security of cloud-native applications by performing anomaly classification over all the inbound and outbound network traffic. The architecture considers the major characteristics of a Federated Learning approach, including the ability to train AI models on decentralized data, thus avoiding potential data breaches that could compromise data security and privacy. By combining a FL-based approach with Convolutional Autoencoders (CAE), DeepGuardian can classify network traffic as normal or malicious without revealing any sensitive information from each application. To increase the existent data privacy level in FL, as well as to increase the trust level between the different federated parties, this framework incorporates advanced privacy-enhancing technologies (PETs) like Zero knowledge Proof (ZKP) and Differential Privacy (DP). The first one is a cryptographic method that enables the verification of data without revealing its content, ensuring that any information remains completely secure and private. This method allows the Aggregator and the Agent to share information without revealing its content, thus increasing data privacy and security throughout training federated rounds. The second one is a technique designed to add controlled noise to the data, ensuring that the output of any analysis does not compromise the privacy of individual data entries. Combine DP with FL-based approach ensure that, after local training and before sharing the model updates between Agent and Aggregator, the data won’t contain any sensitive information about this Agent.


Why use deepGuardian?

Secure

Secure

DeepGuardian offers security, ensuring that data and communications are protected against possible malicious intents tart protected deploymebts can be put against. Through the application of latest state of art cryptographic techniques we ensure that any data being generated by the users remains private and always protected.

Robust

Robust

DeepGuardian is a strong and stable software which along with the maintenance of systems from malicious sources, provides a reliable and consistent performance by applying continuous intrinsic analysis to cope with possible erroneous inputs.

Intuitive

Intuitive

The Intrusion Detection software offers an intuitive interface that allows users to easily navigate, interact with the different components through dashboards and graphics visualizations, making it approachable and reliable to understand and act on detected network anomalies.

Configurable

Configurable

Almost every aspect of the system is configurable, facilitating model customization for traffic as well as representation of the outputing results. This extensive configuration also allows the creation and addition of proprietary classification models for tailored solutions.

DeepGuardian offers a range of powerful functionalities to enhance network security. This framework leverages artificial intelligence to identify deviations from normal network behaviour. By continuously analysing network traffic, it can detect unusual patterns that may indicate threats, allowing for immediate response and mitigation. This framework provides a comprehensive view of networks activities, enabling the detection of sophisticated threats that may bypass traditional security measures.

DeepGuardian was designed to provide real-time protection to micro-services within Kubernetes environment. One of the ways this is achieve is by not sharing any sensitive information between components inside this environment and make this environment more secure.

With this framework, you can choose what service you want to protect and our multiprocessing execution process the evolution of multiple application models, classifying ongoing service traffic between this environment. With this framework, you can choose what application you want to protect and then for each application you may visualize the inbound and outbound network traffic, visualize normal and malicious flows and the performance of the detection module. You can also check the overall status of the applications being monitored in a single screen, which provides a global overview of your system.