๐Ÿ›ก๏ธ WinSentinel AI - Security Log Analysis Model

A fine-tuned Llama 3.2 3B model specialized in Windows security event log analysis and threat detection.

Features

  • Threat Classification โ€” Categorizes events as normal, suspicious, or malicious
  • Severity Assessment โ€” Rates threats from Low to Critical
  • Intelligent Explanations โ€” Provides context for why an event matters
  • Action Recommendations โ€” Suggests specific remediation steps
  • Conversational โ€” Responds naturally to general questions about itself and cybersecurity

Usage

With Ollama

# Download the GGUF file and Modelfile, then:
ollama create winsentinel -f Modelfile
ollama run winsentinel

Example

Input:

Timestamp: 2026-02-15 03:22:41
Source IP: 45.33.12.88
User: admin
Event Type: login_failed
Message: Multiple failed login attempts from external IP

Output:

Threat Category: suspicious
Severity: Medium
Explanation: This event is significant because it matches known behavior patterns for credential access.
Recommended Action: Monitor the system and review logs for anomalies. Consider implementing MFA.

Training Details

  • Base Model: unsloth/Llama-3.2-3B-Instruct
  • Method: QLoRA (4-bit quantization + LoRA adapters)
  • Dataset: 28,000+ security event logs + conversational data
  • Hardware: NVIDIA RTX 3050 6GB
Downloads last month

-

Downloads are not tracked for this model. How to track
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐Ÿ™‹ Ask for provider support

Model tree for Mittai17/WinSentinel-Llama3.2-3B-GGUF

Finetuned
(1536)
this model