Skip to content

devmonixtechnologies/NORD

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ NORD Security System

nord-mini

Enterprise-grade defensive security tool for Parrot OS with comprehensive monitoring, threat detection, and vulnerability scanning capabilities.

Developed by DevMonix Technologies (www.devmonix.io)

NORD Security System provides real-time monitoring, vulnerability scanning, and security event logging to help protect your system from various threats.


πŸ“‹ Table of Contents

  1. πŸš€ Complete Installation Guide
  2. πŸ“– Comprehensive Usage Examples
  3. πŸ”§ Detailed Troubleshooting Section
  4. πŸ› Advanced Debugging Techniques
  5. ⚑ Performance Optimization Tips

πŸš€ Complete Installation Guide

System Requirements

  • Operating System: Parrot OS (Home/Security editions)
  • Python Version: 3.8 or higher
  • RAM: Minimum 2GB, Recommended 4GB+
  • Disk Space: 100MB for installation, 1GB+ for logs
  • Permissions: User or sudo access

Step-by-Step Installation

Method 1: Quick Setup (Recommended)

# 1. Navigate to the NORD directory
cd nord

# 2. Run the automated setup script
./setup_commands.sh

# 3. Restart your terminal or source bash configuration
source ~/.bashrc

# 4. Verify installation
nord --help

Method 2: Manual Installation

# 1. Install system dependencies
sudo apt update
sudo apt install python3 python3-pip python3-psutil python3-notify2

# 2. Install Python dependencies
pip3 install -r requirements.txt --user

# 3. Create installation directory
mkdir -p ~/.local/nord_security

# 4. Copy files
cp nord.py ~/.local/nord_security/
cp welcome.py ~/.local/nord_security/
cp nord_gui.py ~/.local/nord_security/

# 5. Create command symlinks
mkdir -p ~/.local/bin
ln -sf ~/.local/nord_security/nord.py ~/.local/bin/nord
ln -sf ~/.local/nord_security/welcome.py ~/.local/bin/nord-welcome

# 6. Make scripts executable
chmod +x ~/.local/bin/nord ~/.local/bin/nord-welcome

# 7. Add to PATH (if not already there)
echo 'export PATH="$HOME/.local/bin:$PATH"' >> ~/.bashrc
source ~/.bashrc

Method 3: System-wide Installation

# 1. Run as root for system-wide installation
sudo ./install.sh

# 2. Enable systemd service (optional)
sudo systemctl enable nord
sudo systemctl start nord

# 3. Verify service status
sudo systemctl status nord

Post-Installation Verification

# Test basic functionality
nord --help
nord-welcome
nord status

# Check configuration
nord config

# Run initial scan
nord scan --no-banner

Environment Setup

# Verify Python installation
python3 --version

# Check required packages
python3 -c "import psutil, json, subprocess, sys; print('Dependencies OK')"

# Verify PATH configuration
which nord
which nord-welcome

πŸ“– Comprehensive Usage Examples

Basic Operations

1. Getting Help

# Show all available commands
nord --help

# Show help with specific action
nord start --help

2. System Status

# Quick status check
nord status

# Detailed status without banner
nord status --no-banner

# Status with verbose output
nord status --verbose

3. Security Monitoring

# Start monitoring in foreground
nord start

# Start monitoring with verbose output
nord start --verbose

# Start monitoring without banner
nord start --no-banner

# Start monitoring with both options
nord start --verbose --no-banner

4. Vulnerability Scanning

# Quick vulnerability scan
nord scan

# Detailed scan with verbose output
nord scan --verbose

# Silent scan (no banner)
nord scan --no-banner

5. Reporting

# Generate security report
nord report

# Generate report with verbose output
nord report --verbose

# Silent report generation
nord report --no-banner

6. Configuration Management

# Show configuration file location
nord config

# Edit configuration (opens in default editor)
nord config --edit  # (if implemented)

# Reset configuration to defaults
nord config --reset  # (if implemented)

Advanced Operations

1. Background Monitoring

# Start monitoring in background
nohup nord start --no-banner > /dev/null 2>&1 &

# Check if monitoring is running
ps aux | grep nord

# Stop background monitoring
pkill -f "nord.py start"

2. Service Management

# Enable automatic startup
sudo systemctl enable nord

# Start service
sudo systemctl start nord

# Check service status
sudo systemctl status nord

# View service logs
sudo journalctl -u nord -f

# Stop service
sudo systemctl stop nord

# Disable automatic startup
sudo systemctl disable nord

3. Log Management

# View recent security events
tail -f ~/.nord_security/logs/security_events.json

# View daily logs
tail -f ~/.nord_security/logs/nord_$(date +%Y%m%d).log

# Search logs for specific events
grep "HIGH" ~/.nord_security/logs/security_events.json

# Clean old logs (older than 30 days)
find ~/.nord_security/logs -name "*.log" -mtime +30 -delete

4. GUI Interface

# Launch graphical interface
python3 nord_gui.py

# Launch GUI in background
python3 nord_gui.py &

# GUI with specific configuration
python3 nord_gui.py --config ~/.nord_security/custom_config.json

Real-World Usage Scenarios

Scenario 1: Daily Security Check

#!/bin/bash
# daily_security_check.sh

echo "πŸ›‘οΈ Running daily security check..."

# Update system
sudo apt update

# Run NORD vulnerability scan
nord scan --no-banner

# Generate daily report
nord report --no-banner

# Check system status
nord status --no-banner

# Show recent high-priority events
echo "🚨 Recent High-Priority Events:"
grep "HIGH" ~/.nord_security/logs/security_events.json | tail -5

echo "βœ… Daily security check completed!"

Scenario 2: Server Monitoring Setup

#!/bin/bash
# server_monitoring_setup.sh

# Configure for server environment
cat > ~/.nord_security/config.json << EOF
{
  "monitoring": {
    "network_monitoring": true,
    "process_monitoring": true,
    "file_integrity": true,
    "port_monitoring": true,
    "log_monitoring": true
  },
  "thresholds": {
    "suspicious_connections": 50,
    "failed_logins": 10,
    "cpu_usage": 90,
    "memory_usage": 90,
    "disk_usage": 85
  },
  "alerts": {
    "email_enabled": true,
    "email_address": "[email protected]",
    "desktop_notifications": true,
    "log_level": "INFO"
  },
  "whitelist": {
    "trusted_ips": ["127.0.0.1", "::1", "10.0.0.0/8"],
    "trusted_processes": ["systemd", "sshd", "nginx", "apache2"],
    "excluded_dirs": ["/proc", "/sys", "/dev", "/tmp"]
  }
}
EOF

# Start monitoring as service
sudo systemctl enable nord
sudo systemctl start nord

echo "πŸ–₯️ Server monitoring configured and started!"

Scenario 3: Development Environment

#!/bin/bash
# dev_environment_setup.sh

# Developer-friendly configuration
cat > ~/.nord_security/config.json << EOF
{
  "monitoring": {
    "network_monitoring": true,
    "process_monitoring": false,
    "file_integrity": true,
    "port_monitoring": true,
    "log_monitoring": false
  },
  "thresholds": {
    "suspicious_connections": 20,
    "failed_logins": 5,
    "cpu_usage": 80,
    "memory_usage": 85,
    "disk_usage": 90
  },
  "alerts": {
    "email_enabled": false,
    "email_address": "",
    "desktop_notifications": true,
    "log_level": "WARNING"
  },
  "whitelist": {
    "trusted_ips": ["127.0.0.1", "::1"],
    "trusted_processes": ["code", "node", "python3", "npm", "yarn"],
    "excluded_dirs": ["/proc", "/sys", "/dev", "/tmp", "node_modules"]
  }
}
EOF

echo "πŸ’» Development environment configured!"

πŸ”§ Detailed Troubleshooting Section

Common Installation Issues

Issue 1: "Command not found: nord"

Symptoms:

$ nord --help
bash: nord: command not found

Causes:

  • PATH not configured correctly
  • Symlinks not created
  • Setup script not executed

Solutions:

# 1. Run setup script
./setup_commands.sh

# 2. Source bash configuration
source ~/.bashrc

# 3. Restart terminal
# Close and reopen terminal

# 4. Manual PATH setup
export PATH="$HOME/.local/bin:$PATH"
echo 'export PATH="$HOME/.local/bin:$PATH"' >> ~/.bashrc

# 5. Verify installation
which nord
ls -la ~/.local/bin/nord

Issue 2: "Permission Denied"

Symptoms:

$ ./setup_commands.sh
bash: ./setup_commands.sh: Permission denied

Causes:

  • Script not executable
  • File permission issues

Solutions:

# 1. Make script executable
chmod +x setup_commands.sh
chmod +x install.sh
chmod +x nord.py

# 2. Run with proper permissions
./setup_commands.sh

# 3. Check file permissions
ls -la *.sh *.py

# 4. If still issues, run with sudo
sudo ./install.sh

Issue 3: Python Dependencies Missing

Symptoms:

$ python3 nord.py start
ModuleNotFoundError: No module named 'psutil'

Causes:

  • Required Python packages not installed
  • Virtual environment issues
  • Python path problems

Solutions:

# 1. Install system packages
sudo apt update
sudo apt install python3-pip python3-psutil python3-notify2

# 2. Install Python dependencies
pip3 install -r requirements.txt --user

# 3. Check Python installation
python3 --version
python3 -c "import sys; print(sys.path)"

# 4. Verify packages
python3 -c "import psutil, json, subprocess; print('Dependencies OK')"

# 5. If pip issues, try alternative
sudo apt install python3-psutil
python3 -m pip install psutil --user

Issue 4: Externally Managed Environment

Symptoms:

$ pip3 install -r requirements.txt
error: externally-managed-environment

Causes:

  • Python environment managed by system package manager
  • PEP 668 restrictions

Solutions:

# 1. Use system packages
sudo apt install python3-psutil python3-notify2

# 2. Use pip with --break-system-packages (not recommended)
pip3 install -r requirements.txt --break-system-packages --user

# 3. Create virtual environment
python3 -m venv ~/.nord_venv
source ~/.nord_venv/bin/activate
pip install -r requirements.txt

# 4. Use pipx (if available)
pipx install psutil

Common Runtime Issues

Issue 1: "Log directory not found"

Symptoms:

$ nord status
Log directory: /home/user/.nord_security/logs
Error: Log directory not found

Causes:

  • Configuration directory not created
  • Permission issues
  • First run not completed

Solutions:

# 1. Create directories manually
mkdir -p ~/.nord_security/logs
mkdir -p ~/.nord_security/config

# 2. Set proper permissions
chmod 755 ~/.nord_security
chmod 755 ~/.nord_security/logs

# 3. Run initial configuration
nord config

# 4. Test with verbose output
nord status --verbose

Issue 2: Desktop Notifications Not Working

Symptoms:

$ nord start
# No notifications appear for security events

Causes:

  • Notification daemon not running
  • Missing notify2 library
  • Desktop environment issues

Solutions:

# 1. Install notification components
sudo apt install libnotify-bin notify-osd
pip3 install notify2 --user

# 2. Start notification daemon
killall notify-osd
notify-osd &

# 3. Test notifications
python3 -c "import notify2; notify2.init('Test'); notify2.Notification('Test', 'Message').show()"

# 4. Check if notifications enabled in config
grep "desktop_notifications" ~/.nord_security/config.json

Issue 3: High CPU Usage

Symptoms:

$ nord start
# System becomes slow, high CPU usage

Causes:

  • Aggressive monitoring settings
  • System resource thresholds too low
  • Background processes interference

Solutions:

# 1. Check current resource usage
top -p $(pgrep -f nord.py)

# 2. Adjust monitoring frequency
# Edit ~/.nord_security/config.json
# Increase check intervals or disable some monitoring

# 3. Use less intensive configuration
cat > ~/.nord_security/config.json << EOF
{
  "monitoring": {
    "network_monitoring": true,
    "process_monitoring": false,
    "file_integrity": false,
    "port_monitoring": true,
    "log_monitoring": false
  },
  "thresholds": {
    "suspicious_connections": 50,
    "failed_logins": 10,
    "cpu_usage": 95,
    "memory_usage": 95,
    "disk_usage": 90
  }
}
EOF

# 4. Monitor with verbose output to identify issue
nord start --verbose

Issue 4: Service Won't Start

Symptoms:

$ sudo systemctl start nord
Job for nord.service failed

Causes:

  • Systemd service file issues
  • Permission problems
  • Configuration errors

Solutions:

# 1. Check service status
sudo systemctl status nord

# 2. View service logs
sudo journalctl -u nord -n 50

# 3. Check service file
sudo cat /etc/systemd/system/nord.service

# 4. Reload systemd daemon
sudo systemctl daemon-reload

# 5. Test manual start
sudo -u nord nord start --verbose

# 6. Check if user exists
sudo useradd -r -s /bin/false nord 2>/dev/null || echo "User exists"

Configuration Issues

Issue 1: Invalid JSON Configuration

Symptoms:

$ nord status
Error: Invalid configuration file

Causes:

  • JSON syntax errors
  • Missing required fields
  • Incorrect data types

Solutions:

# 1. Validate JSON syntax
python3 -m json.tool ~/.nord_security/config.json

# 2. Reset to default configuration
mv ~/.nord_security/config.json ~/.nord_security/config.json.backup
nord config  # This will create a new default config

# 3. Manual configuration check
cat ~/.nord_security/config.json | python3 -c "import json, sys; json.load(sys.stdin)"

# 4. Use template configuration
cp config.template.json ~/.nord_security/config.json

Issue 2: Thresholds Too Sensitive

Symptoms:

$ nord start
# Constant alerts for normal system activity

Causes:

  • Threshold values set too low
  • Whitelist not configured properly
  • System-specific activity patterns

Solutions:

# 1. Review current thresholds
grep -A 10 "thresholds" ~/.nord_security/config.json

# 2. Adjust thresholds for your system
# Edit ~/.nord_security/config.json and increase values

# 3. Add system-specific items to whitelist
# Update trusted_ips, trusted_processes, excluded_dirs

# 4. Monitor system baseline
# Run nord status for a while to see normal activity patterns

# 5. Use verbose mode to understand triggers
nord start --verbose 2>&1 | grep "ALERT"

πŸ› Advanced Debugging Techniques

Log Analysis

1. Comprehensive Log Review

# View all recent logs
tail -n 100 ~/.nord_security/logs/nord_$(date +%Y%m%d).log

# Monitor logs in real-time
tail -f ~/.nord_security/logs/nord_$(date +%Y%m%d).log

# Search for errors in logs
grep -i "error\|exception\|traceback" ~/.nord_security/logs/*.log

# Find specific event types
grep "NETWORK_SUSPICIOUS\|HIGH_CPU" ~/.nord_security/logs/security_events.json

# Analyze log patterns
awk '{print $1" "$2}' ~/.nord_security/logs/nord_*.log | sort | uniq -c | sort -nr

2. Security Event Analysis

# Export security events for analysis
python3 -c "
import json
with open('~/.nord_security/logs/security_events.json', 'r') as f:
    events = [json.loads(line) for line in f]
    
# Count events by severity
severity_counts = {}
for event in events:
    severity = event.get('severity', 'UNKNOWN')
    severity_counts[severity] = severity_counts.get(severity, 0) + 1
    
print('Event Summary:')
for severity, count in sorted(severity_counts.items()):
    print(f'  {severity}: {count}')
"

# Find recent high-priority events
python3 -c "
import json, datetime
with open('~/.nord_security/logs/security_events.json', 'r') as f:
    events = [json.loads(line) for line in f]
    
recent_high = [e for e in events 
               if e.get('severity') in ['HIGH', 'CRITICAL'] 
               and datetime.datetime.fromisoformat(e['timestamp']) > datetime.datetime.now() - datetime.timedelta(hours=24)]

print('Recent High-Priority Events (24h):')
for event in recent_high[-5:]:
    print(f'  {event[\"timestamp\"]}: {event[\"event_type\"]} - {event[\"description\"]}')
"

3. Performance Analysis

# Monitor NORD process performance
while true; do
  echo "$(date): $(ps aux | grep '[n]ord.py' | awk '{print $3, $4}')"
  sleep 5
done

# Check memory usage over time
python3 -c "
import psutil, time, json
nord_processes = [p for p in psutil.process_iter() if 'nord.py' in ' '.join(p.cmdline())]
if nord_processes:
    p = nord_processes[0]
    print(f'PID: {p.pid}')
    print(f'CPU: {p.cpu_percent()}%')
    print(f'Memory: {p.memory_info().rss / 1024 / 1024:.1f} MB')
    print(f'Threads: {p.num_threads()}')
else:
    print('NORD process not found')
"

# Disk usage analysis
du -sh ~/.nord_security/logs/*
find ~/.nord_security/logs -name "*.json" -exec wc -l {} \;

Debug Mode Operations

1. Verbose Debugging

# Start with maximum verbosity
nord start --verbose 2>&1 | tee nord_debug.log

# Monitor specific components
nord start --verbose 2>&1 | grep -E "(Network|Process|Port)"

# Debug configuration loading
nord config --verbose 2>&1

# Debug vulnerability scanning
nord scan --verbose 2>&1 | tee scan_debug.log

2. Component Isolation Testing

# Test network monitoring only
python3 -c "
from nord import NordSecurity
nord = NordSecurity()
nord.config['monitoring']['network_monitoring'] = True
nord.config['monitoring']['process_monitoring'] = False
nord.config['monitoring']['port_monitoring'] = False
nord.config['monitoring']['file_integrity'] = False
nord.config['monitoring']['log_monitoring'] = False
nord.start_monitoring()
"

# Test specific vulnerability checks
python3 -c "
from nord import NordSecurity
nord = NordSecurity()
nord.run_vulnerability_scan()
"

3. Interactive Debugging

# Start Python debugger
python3 -m pdb nord.py start

# Breakpoint debugging
python3 -c "
import pdb
from nord import NordSecurity
pdb.set_trace()
nord = NordSecurity()
nord.start_monitoring()
"

System Integration Debugging

1. Permission and Access Issues

# Check file permissions
find ~/.nord_security -type f -exec ls -la {} \;

# Test write permissions
touch ~/.nord_security/logs/test_write.log && rm ~/.nord_security/logs/test_write.log

# Check process capabilities
ps aux | grep nord
cat /proc/$(pgrep -f nord.py)/status

# Test network access
python3 -c "import socket; s = socket.socket(); s.connect(('8.8.8.8', 53)); print('Network OK'); s.close()"

2. Dependency Verification

# Complete dependency check
python3 -c "
import sys
required_modules = ['psutil', 'json', 'subprocess', 'threading', 'datetime', 'logging', 'os', 'time']
missing = []
for module in required_modules:
    try:
        __import__(module)
        print(f'βœ“ {module}')
    except ImportError:
        missing.append(module)
        print(f'βœ— {module}')

if missing:
    print(f'Missing modules: {missing}')
else:
    print('All dependencies satisfied')
"

# Check system commands
commands = ['netstat', 'ss', 'lsof', 'ps', 'uptime', 'df']
for cmd in commands:
    if subprocess.run(['which', cmd], capture_output=True).returncode == 0:
        print(f'βœ“ {cmd}')
    else:
        print(f'βœ— {cmd}')
"

3. Environment Debugging

# Check environment variables
env | grep -E "(PATH|PYTHON|HOME|USER)"

# Check Python environment
python3 -c "
import sys, os
print('Python executable:', sys.executable)
print('Python version:', sys.version)
print('Python path:', sys.path[:3])
print('Current user:', os.getlogin())
print('Home directory:', os.path.expanduser('~'))
print('Current directory:', os.getcwd())
"

# Check system resources
python3 -c "
import psutil
print(f'CPU cores: {psutil.cpu_count()}')
print(f'Memory total: {psutil.virtual_memory().total / 1024**3:.1f} GB')
print(f'Disk usage: {psutil.disk_usage(\"/\").percent}%')
print(f'Network interfaces: {list(psutil.net_if_addrs().keys())}')
"

Automated Debugging Scripts

1. System Health Check

#!/bin/bash
# nord_health_check.sh

echo "πŸ₯ NORD Security System Health Check"
echo "====================================="

# Check installation
echo "πŸ“¦ Installation Status:"
if command -v nord >/dev/null 2>&1; then
    echo "βœ“ NORD command available"
else
    echo "βœ— NORD command not found"
fi

# Check dependencies
echo -e "\nπŸ”— Dependencies:"
python3 -c "
import sys
deps = ['psutil', 'json', 'subprocess', 'threading']
for dep in deps:
    try:
        __import__(dep)
        print(f'βœ“ {dep}')
    except ImportError:
        print(f'βœ— {dep}')
"

# Check configuration
echo -e "\nβš™οΈ Configuration:"
if [ -f ~/.nord_security/config.json ]; then
    echo "βœ“ Configuration file exists"
    if python3 -m json.tool ~/.nord_security/config.json >/dev/null 2>&1; then
        echo "βœ“ Configuration JSON valid"
    else
        echo "βœ— Configuration JSON invalid"
    fi
else
    echo "βœ— Configuration file missing"
fi

# Check directories
echo -e "\nπŸ“ Directories:"
for dir in ~/.nord_security ~/.nord_security/logs ~/.nord_security/config; do
    if [ -d "$dir" ]; then
        echo "βœ“ $dir exists"
    else
        echo "βœ— $dir missing"
    fi
done

# Check recent activity
echo -e "\nπŸ“Š Recent Activity:"
if [ -f ~/.nord_security/logs/security_events.json ]; then
    event_count=$(wc -l < ~/.nord_security/logs/security_events.json)
    echo "βœ“ $event_count security events logged"
else
    echo "βœ— No security events found"
fi

echo -e "\n🏁 Health check completed!"

2. Performance Monitor

#!/bin/bash
# nord_performance_monitor.sh

echo "πŸ“ˆ NORD Performance Monitor"
echo "=========================="

# Monitor for 60 seconds
for i in {1..12}; do
    echo "$(date '+%H:%M:%S'):"
    
    if pgrep -f "nord.py" >/dev/null; then
        pid=$(pgrep -f "nord.py")
        cpu=$(ps -p $pid -o %cpu --no-headers)
        mem=$(ps -p $pid -o %mem --no-headers)
        echo "  CPU: ${cpu}% | Memory: ${mem}%"
    else
        echo "  NORD not running"
    fi
    
    sleep 5
done

⚑ Performance Optimization Tips

System-Level Optimizations

1. Resource Management

# 1. Optimize monitoring intervals
# Edit ~/.nord_security/config.json
{
  "monitoring": {
    "check_interval": 5,        // Increase from 1 to 5 seconds
    "network_timeout": 2,      // Reduce network check timeout
    "process_sample_size": 50   // Limit process monitoring sample
  }
}

# 2. Disable unnecessary monitoring features
{
  "monitoring": {
    "network_monitoring": true,
    "process_monitoring": false,    // Disable if not needed
    "file_integrity": false,       // Resource intensive
    "port_monitoring": true,
    "log_monitoring": false        // Disable if not needed
  }
}

# 3. Optimize thresholds to reduce false positives
{
  "thresholds": {
    "suspicious_connections": 50,   // Increase from 10
    "failed_logins": 15,           // Increase from 5
    "cpu_usage": 90,               // Increase from 80
    "memory_usage": 90,            // Increase from 85
    "disk_usage": 95               // Increase from 90
  }
}

2. System Resource Allocation

# 1. Set process priority
# Edit nord_service or use nice command
nice -n 10 nord start

# 2. Limit memory usage
# Add to configuration
{
  "performance": {
    "max_memory_mb": 256,
    "max_cpu_percent": 50,
    "gc_interval": 300
  }
}

# 3. Optimize I/O operations
{
  "logging": {
    "buffer_size": 8192,
    "flush_interval": 10,
    "rotate_size_mb": 10
  }
}

Monitoring Optimization

1. Selective Monitoring

# 1. Network-only monitoring (lightweight)
{
  "monitoring": {
    "network_monitoring": true,
    "process_monitoring": false,
    "file_integrity": false,
    "port_monitoring": false,
    "log_monitoring": false
  }
}

# 2. Security-focused monitoring
{
  "monitoring": {
    "network_monitoring": true,
    "process_monitoring": true,
    "file_integrity": true,
    "port_monitoring": true,
    "log_monitoring": false
  },
  "thresholds": {
    "suspicious_connections": 20,
    "failed_logins": 5,
    "cpu_usage": 95,
    "memory_usage": 95
  }
}

# 3. Development environment (minimal impact)
{
  "monitoring": {
    "network_monitoring": true,
    "process_monitoring": false,
    "file_integrity": false,
    "port_monitoring": true,
    "log_monitoring": false
  },
  "alerts": {
    "desktop_notifications": false,
    "log_level": "ERROR"
  }
}

2. Whitelist Optimization

# 1. Comprehensive whitelist for production
{
  "whitelist": {
    "trusted_ips": [
      "127.0.0.1", "::1",
      "10.0.0.0/8", "172.16.0.0/12", "192.168.0.0/16"
    ],
    "trusted_processes": [
      "systemd", "kernel", "kthreadd", "ksoftirqd",
      "sshd", "networkd", "resolved", "chronyd",
      "nginx", "apache2", "mysql", "postgres"
    ],
    "excluded_dirs": [
      "/proc", "/sys", "/dev", "/run", "/tmp",
      "/var/cache", "/var/lock", "/usr/share/doc"
    ]
  }
}

# 2. Minimal whitelist for security
{
  "whitelist": {
    "trusted_ips": ["127.0.0.1", "::1"],
    "trusted_processes": ["systemd", "sshd"],
    "excluded_dirs": ["/proc", "/sys", "/dev"]
  }
}

Log Management Optimization

1. Log Rotation and Cleanup

# 1. Configure log rotation
# Add to ~/.nord_security/config.json
{
  "logging": {
    "max_log_size_mb": 50,
    "max_log_files": 7,
    "compress_old_logs": true,
    "cleanup_days": 30
  }
}

# 2. Automated cleanup script
#!/bin/bash
# nord_log_cleanup.sh

LOG_DIR="$HOME/.nord_security/logs"

# Compress logs older than 1 day
find "$LOG_DIR" -name "*.log" -mtime +1 -exec gzip {} \;

# Remove logs older than 30 days
find "$LOG_DIR" -name "*.log.gz" -mtime +30 -delete
find "$LOG_DIR" -name "*.json" -mtime +30 -delete

# Remove empty log files
find "$LOG_DIR" -name "*.log" -empty -delete

echo "Log cleanup completed"

2. Event Filtering

# 1. Filter out informational events
{
  "alerts": {
    "log_level": "WARNING",  // Only log WARNING and above
    "store_info_events": false
  }
}

# 2. Event deduplication
{
  "events": {
    "deduplicate_similar": true,
    "deduplication_window": 300,  // 5 minutes
    "max_events_per_type": 100
  }
}

Hardware-Specific Optimizations

1. Low-Resource Systems

# 1. Minimal configuration for <2GB RAM
{
  "monitoring": {
    "network_monitoring": true,
    "process_monitoring": false,
    "file_integrity": false,
    "port_monitoring": false,
    "log_monitoring": false,
    "check_interval": 10
  },
  "thresholds": {
    "cpu_usage": 95,
    "memory_usage": 95,
    "disk_usage": 90
  },
  "performance": {
    "max_memory_mb": 128,
    "thread_pool_size": 2
  }
}

# 2. Batch processing for slow systems
{
  "batch_processing": {
    "enabled": true,
    "batch_size": 10,
    "batch_interval": 30
  }
}

2. High-Performance Systems

# 1. Full monitoring for powerful systems
{
  "monitoring": {
    "network_monitoring": true,
    "process_monitoring": true,
    "file_integrity": true,
    "port_monitoring": true,
    "log_monitoring": true,
    "check_interval": 1,
    "deep_scan": true
  },
  "performance": {
    "max_memory_mb": 1024,
    "thread_pool_size": 8,
    "parallel_processing": true
  },
  "advanced_features": {
    "machine_learning_detection": true,
    "behavioral_analysis": true,
    "anomaly_detection": true
  }
}

Automation and Scheduling

1. Scheduled Operations

# 1. Cron jobs for automated tasks
# Edit crontab with: crontab -e

# Daily vulnerability scan at 2 AM
0 2 * * * /home/user/.local/bin/nord scan --no-banner

# Weekly report generation on Sunday at 3 AM
0 3 * * 0 /home/user/.local/bin/nord report --no-banner

# Log cleanup every day at 4 AM
0 4 * * * /home/user/nord/nord_log_cleanup.sh

# Health check every 6 hours
0 */6 * * * /home/user/nord/nord_health_check.sh >> ~/.nord_health.log

2. Performance Monitoring

#!/bin/bash
# nord_performance_scheduler.sh

# Monitor system load and adjust NORD behavior
LOAD_1MIN=$(uptime | awk -F'load average:' '{print $2}' | awk '{print $1}' | sed 's/,//')

if (( $(echo "$LOAD_1MIN > 2.0" | bc -l) )); then
    echo "High load detected, reducing NORD monitoring intensity"
    # Create low-intensity config
    cat > ~/.nord_security/config_low.json << EOF
{
  "monitoring": {
    "network_monitoring": true,
    "process_monitoring": false,
    "file_integrity": false,
    "port_monitoring": false,
    "log_monitoring": false,
    "check_interval": 15
  }
}
EOF
    # Restart with low-intensity config
    pkill -f "nord.py start"
    sleep 2
    nord start --config ~/.nord_security/config_low.json --no-banner &
else
    echo "Normal load, using standard configuration"
fi

🏒 About DevMonix Technologies

DevMonix Technologies is a leading cybersecurity solutions provider, specializing in custom software solutions, cyber security solutions and DevOps services for enterprise security:

  • πŸ”’ Enterprise Security Solutions
  • πŸ›‘οΈ Threat Detection Systems
  • πŸš€ Security Automation
  • πŸ” Vulnerability Assessment
  • πŸ“Š Security Analytics

🌐 Visit Us


πŸ“„ License

This project is licensed under the MIT License - Developed and maintained by DevMonix Technologies

πŸ†˜ Support

For issues and questions:

  • Check the troubleshooting section above
  • Review log files in ~/.nord_security/logs/
  • Create an issue on the project repository
  • Contact DevMonix support team

NORD Security System - Enterprise-grade protection for Parrot OS by DevMonix Technologies.

About

Enterprise-grade defensive security tool for Parrot OS with comprehensive monitoring, threat detection, and vulnerability scanning capabilities.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors