NetworkVision

Real-time network threat detection using YOLO object detection on edge AI hardware. Sub-millisecond inference. Zero cloud dependency.

Patent Pending 7 Threat Classes Edge AI <0.5ms Inference
2,980
NAIs Captured
<0.5ms
Combined Inference
7
Threat Classes
$70
Hardware Cost

How It Works

01

Capture

Raw packets are captured via raw sockets and mapped to flows using consistent hashing.

02

Visualize

Network flows are converted to 2D Network Activity Images (NAIs) — 32×32 grids with 10 channels encoding packet size, protocol, timing, and flow behavior.

03

Detect

YOLO object detection runs on the NAI, identifying and localizing threats with bounding-box regression — not just classification.

04

Alert

Threats are classified, localized to specific flows, and reported in real-time. The oracle auto-labels data for continuous retraining.

Threat Classes

🔍
Port Scan
💥
DoS/DDoS
🐛
Exploit
🌐
Web Attack
🤖
Botnet/C2
🔑
Brute Force
Benign

Live Demo

Running on Raspberry Pi 5 + Coral Edge TPU

Latest NAI

32×32 Network Activity Image — each pixel represents flow activity over a 30-second window

Detection Log

Connecting to edge device...
Oracle Status● Active
Suricata Alerts
Packets/sec
Active Flows

Edge Hardware

Raspberry Pi 5
8GB RAM • ARM Cortex-A76
Coral USB TPU
4 TOPS • INT8 • 0.5W
Hailo-10H
20 TOPS INT8 • 2.5W
Total Cost
~$170 complete system

🛡️ Built for the Post-Mythos Era

Anthropic's Claude Mythos Preview can autonomously find and exploit zero-day vulnerabilities in every major OS. Signature-based IDS can't detect novel AI-generated exploits. NetworkVision detects the behavioral pattern on the wire — port scans, C2 beacons, exfiltration — regardless of the specific exploit. The traffic shape is detectable even when the attack is brand new.

Interested?

NetworkVision is patent-pending and seeking partners for edge security deployment.

Get in Touch View Research