Part of the uWAN Security Ecosystem

UDPI

Real-Time Network Threat Detection with Deep Learning

Neural network-based packet analysis delivering sub-100ms intrusion detection with 97%+ accuracy

Real-time Protection
Sub-100ms latency from packet capture to threat classification
High Accuracy
97%+ detection rate on NSL-KDD and CIC-IDS2017 benchmarks
Privacy-First
Local processing with no data exfiltration
Hardware-Optimized
Native support for Apple Silicon, x86_64, ARM64
100K+ packets/sec<100ms latency97.8% accuracy

How UDPI Protects Your Network

UDPI operates as a silent guardian on your network, analyzing every packet in real-time using machine learning models trained on millions of attack samples.

Packet Capture
Monitor network interface, capture packets without impact
Feature Extraction
Analyze 283 unique characteristics
Neural Network
CNN, CNN-LSTM, Autoencoder evaluate
Ensemble Decision
Weighted voting for maximum accuracy
Actionable Alerts
Threat classification with confidence scores

What UDPI Detects

DoS/DDoS attacks
Port scanning
Brute force attempts
Botnet C&C traffic
Web attacks (SQLi, XSS)
Malware channels
Data exfiltration
Zero-day patterns

Performance You Can Measure

Detection Accuracy

DatasetSamplesThreat TypesAccuracy
NSL-KDD125,973DoS, Probe, R2L, U2R97.8%
CIC-IDS20172.8M+DDoS, PortScan, Web, Botnet96.4%
CIDDS-001671,241PortScan, BruteForce, DoS96.8%

* Shipped UDPI may not use these datasets as training data

100K+
packets/sec throughput
<100ms
end-to-end latency
<500MB
typical memory usage
~1.4K
samples/sec training
Rust-Native
Memory-safe, zero-copy processing, async I/O for high throughput
ML Stack
Candle ML (Hugging Face), CNN/CNN-LSTM/Autoencoder, in-Rust training
Platform Support
macOS (Apple Silicon/Intel), Linux (x86_64/ARM64), Embedded ARM64

Privacy & Security

  • Local processing only, no cloud dependency
  • IP addresses anonymized in logs
  • Configurable data retention policies
  • Drop-root privileges after initialization
  • SafeTensors format for model loading

Who Uses UDPI

Enterprise Security Teams
Monitor for APTs, reduce alert fatigue, complement existing SIEM solutions
MSSPs
Lightweight deployment, scale without hardware, custom-trained models
Educational Institutions
Protect campus networks, research security patterns, train students
Cloud Providers
Multi-tenant IDS, compliance support, value-added security services
Critical Infrastructure
SCADA protection, detect reconnaissance, air-gapped security

Part of the uWAN Security Platform

UDPI operates as the core detection engine within UWAN, providing real-time threat intelligence

Threat Feeds
UDPI alerts enrich UWAN's global threat intelligence database
Policy Enforcement
Detection triggers automated response actions across UWAN components
Analytics Pipeline
Packet and flow data contribute to long-term trend analysis
Multi-Tenant Architecture
Isolate detection contexts for different organizational units

Complementary UWAN Components

  • Firewall Integration (automatic rule updates)
  • SIEM Correlation (ML confidence scores)
  • Threat Intelligence (global attack database)
  • Incident Response (automated playbooks)

Extensibility

REST APIConfigurable outputs (JSON, Syslog, webhook)Custom model training pipelinePlugin architecture

Getting Started with UDPI

Quick Evaluation
Request a demo or contact the UWAN team for a pre-built evaluation package tailored to your environment.

Production Deployment

1

Install

Download the package for your platform (macOS, Linux x86_64, Linux ARM64)

2

Configure

Specify network interface and detection preferences in the configuration file

3

Deploy

Run the service—automatically initializes and begins monitoring

4

Integrate

Connect alert outputs to your existing SIEM or security workflows

Custom Model Training
Train on your organization's network traffic for specialized threat detection. UDPI supports training on your own PCAP data.

Model Training Data:

  • • Synthetic Generated Data (algorithmically generated patterns)
  • • Public Domain Datasets (government and research data)
  • • Customer Data (your own network traffic)

All models ship with permissive licenses suitable for commercial deployment.

Ready to enhance your network security?

Get in touch with our team to learn more about UDPI and the uWAN security platform.

uWAN BoreasTUN Dashboard Logo