๐ก๏ธ WinSentinel AI - Security Log Analysis Model
A fine-tuned Llama 3.2 3B model specialized in Windows security event log analysis and threat detection.
Features
- Threat Classification โ Categorizes events as normal, suspicious, or malicious
- Severity Assessment โ Rates threats from Low to Critical
- Intelligent Explanations โ Provides context for why an event matters
- Action Recommendations โ Suggests specific remediation steps
- Conversational โ Responds naturally to general questions about itself and cybersecurity
Usage
With Ollama
# Download the GGUF file and Modelfile, then:
ollama create winsentinel -f Modelfile
ollama run winsentinel
Example
Input:
Timestamp: 2026-02-15 03:22:41
Source IP: 45.33.12.88
User: admin
Event Type: login_failed
Message: Multiple failed login attempts from external IP
Output:
Threat Category: suspicious
Severity: Medium
Explanation: This event is significant because it matches known behavior patterns for credential access.
Recommended Action: Monitor the system and review logs for anomalies. Consider implementing MFA.
Training Details
- Base Model: unsloth/Llama-3.2-3B-Instruct
- Method: QLoRA (4-bit quantization + LoRA adapters)
- Dataset: 28,000+ security event logs + conversational data
- Hardware: NVIDIA RTX 3050 6GB
Inference Providers NEW
This model isn't deployed by any Inference Provider. ๐ Ask for provider support
Model tree for Mittai17/WinSentinel-Llama3.2-3B-GGUF
Base model
meta-llama/Llama-3.2-3B-Instruct