DEFENSE
BY DESIGN.

A surgical approach to threat containment. Transforming raw telemetry into immediate defense through LLM-driven reasoning and clinical precision.

76s
Mean Response
99.8%
Accuracy Rate
70+
AV Engines
L3.3
Core Logic

Digital Pathology.

Traditional security systems act as simple filters. Guardian v2 acts as a forensic diagnostician. It treats every suspicious log entry as a clinical symptom, building a full patient history of the threat before taking action.

By integrating Llama 3.3 70B, the agent understands not just the "what" (the hash or the IP), but the "why"—the intent of the attacker. This depth allows for autonomous containment that humans can trust.

System Architecture

A distributed, high-availability blueprint designed for millisecond throughput and unyielding security.

Client Tier

Mobile & Web Assets

API Gateway

Auth & Rate Limiting

Logic Core

Distributed Workers

Data Store

NoSQL & Vector DB

Scaling Strategy

Every component is containerized using Docker and orchestrated via Kubernetes. This ensures that the Guardian Agent can scale horizontally to meet massive bursts in telemetry logs during a coordinated DDoS or ransomware outbreak.

Consistency Model

We utilize a "Eventually Consistent" model for global reporting while maintaining strict "Read-after-Write" consistency for security configurations, ensuring that a blocked IP is recognized across all edge nodes instantly.

The 76-Second Pipeline.

While manual SOC teams take an average of 45 minutes to investigate a ransomware event, Guardian v2 completes the cycle in seconds.

STAGE 01

Ingestion & Enrichment

Raw logs are piped from the Web Server, immediately enriched with global threat data from VirusTotal and AbuseIPDB.

STAGE 02

LLM Reasoning

Our core LLM reviews the context of the user, the timing of the event, and the technical indicators to assign a risk score.

STAGE 03

Autonomous Action

If scores cross the threshold, the Mitigator triggers firewall blocks or account freezes via API—no human waiting required.

Bio-Logical Security.

Transitioning from pre-medical excellence (96%+ grades) to AI programming wasn't a change of focus—it was an expansion of scope. I apply the same "do no harm" discipline and diagnostic rigor to network health as a surgeon applies to a patient.

At GCU Lahore and beyond, I realized that code is simply another form of DNA. Guardian v2 is my digital immune system—a mechanism that recognizes the "non-self" and neutralizes it before it can spread.