lint markdown, representative image
This commit is contained in:
BIN
Gemini_Generated_Image_wv24iuwv24iuwv24.png
Normal file
BIN
Gemini_Generated_Image_wv24iuwv24iuwv24.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 5.6 MiB |
17
README.md
17
README.md
@@ -1,6 +1,6 @@
|
|||||||
# Gamayun -
|
# Gamayun
|
||||||
|
|
||||||
# Forensic Semantic Search System
|

|
||||||
|
|
||||||
## Concept
|
## Concept
|
||||||
|
|
||||||
@@ -13,7 +13,6 @@ This enables the combination of semantic understanding with context and temporal
|
|||||||
|
|
||||||
An investigator can ask "show me what happened after they discussed the payment" and the system will find relevant communication about payments, then correlate subsequent activities (file access, application launches, network traffic) in a temporal sequence, regardless of the specific applications or messaging platforms involved.
|
An investigator can ask "show me what happened after they discussed the payment" and the system will find relevant communication about payments, then correlate subsequent activities (file access, application launches, network traffic) in a temporal sequence, regardless of the specific applications or messaging platforms involved.
|
||||||
|
|
||||||
|
|
||||||
## System Overview
|
## System Overview
|
||||||
|
|
||||||
### Core Concept
|
### Core Concept
|
||||||
@@ -32,8 +31,6 @@ Client-Server Separation: Compute-intensive operations (embedding generation, LL
|
|||||||
- Deployment in air-gapped labs
|
- Deployment in air-gapped labs
|
||||||
- Efficient resource utilization (centralized compute nodes can serve multiple investigators)
|
- Efficient resource utilization (centralized compute nodes can serve multiple investigators)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Data Flow
|
## Data Flow
|
||||||
|
|
||||||
### Ingestion Pipeline
|
### Ingestion Pipeline
|
||||||
@@ -162,7 +159,6 @@ Natural Language Query
|
|||||||
| NLP | spaCy | TBD | MIT | Entity extraction |
|
| NLP | spaCy | TBD | MIT | Entity extraction |
|
||||||
| Programming Language | Python | 3.13+ | PSF | Application logic |
|
| Programming Language | Python | 3.13+ | PSF | Application logic |
|
||||||
|
|
||||||
|
|
||||||
### Infrastructure Requirements
|
### Infrastructure Requirements
|
||||||
|
|
||||||
#### Remote Processing
|
#### Remote Processing
|
||||||
@@ -202,11 +198,11 @@ TBD
|
|||||||
|
|
||||||
### Secondary: Conversion Engine (algorithmic)
|
### Secondary: Conversion Engine (algorithmic)
|
||||||
|
|
||||||
Example:
|
Example:
|
||||||
|
|
||||||
- SQLite Parser for browser History -> Special Data Object
|
- SQLite Parser for browser History -> Special Data Object
|
||||||
- Converter for TSK artifacts -> Metadata in Special Data Object (TBD)
|
- Converter for TSK artifacts -> Metadata in Special Data Object (TBD)
|
||||||
|
|
||||||
|
|
||||||
## Use Case Scenarios
|
## Use Case Scenarios
|
||||||
|
|
||||||
### Scenario 1: Drug Transaction Investigation
|
### Scenario 1: Drug Transaction Investigation
|
||||||
@@ -246,5 +242,6 @@ Query: "What happened between receiving the threatening email and deleting files
|
|||||||
3. Returns all artifacts between these timestamps
|
3. Returns all artifacts between these timestamps
|
||||||
4. Visualizes complete timeline Evidence: Establishes sequence of events and potential motive
|
4. Visualizes complete timeline Evidence: Establishes sequence of events and potential motive
|
||||||
|
|
||||||
# License
|
## License
|
||||||
BSD 3-Clause (subject to change during development)
|
|
||||||
|
BSD 3-Clause (subject to change during development)
|
||||||
|
|||||||
Reference in New Issue
Block a user