Capstone Development Journal

Documenting the architecture, implementation, and challenges of building NestShield.

Defense Complete February 26, 2026

Thesis Defense: Validating XAI, Gamification, and Local-First Architecture

Today marked the culmination of two years of research, development, and iteration—I successfully defended my Master's thesis on NestShield: An AI-Powered Cybersecurity Assistant for Non-Technical Users before my committee at Full Sail University.

Research Validation

The defense validated three core hypotheses through a pre-post intervention study with 42 participants (N=25 completers):

+54.2%

Ransomware Understanding

From 33.3% to 87.5% accuracy

75%

Voluntary Remediation

Gamification drove action

6.4/7

Trust Score

Local-first architecture validated

The Defense Experience

The 60-minute defense included a 10-minute live demonstration of NestShield's core features—AEGIS AI explanations, gamification mechanics, and the Threat Radar visualization. The committee posed challenging questions about research validity, technical architecture decisions, and commercialization feasibility. Each question reinforced the importance of acknowledging limitations while demonstrating confidence in the validated findings.

Key Findings

  • H1 - Knowledge: XAI-driven education significantly improved security comprehension, with the largest gains in complex concepts like ransomware (33.3% → 87.5%).
  • H2 - Behavior: Gamification mechanics achieved a 75% voluntary remediation rate, though a motivation-behavior gap was discovered in 2 participants who felt motivated but lacked enablement.
  • H3 - Trust: Local-first architecture built exceptional user trust (6.4/7), with 93% preferring local processing over cloud alternatives. Trust increased 33% after experiencing the system.

Technical Achievements

NestShield integrated cutting-edge technologies into a cohesive educational platform:

  • AEGIS with RAG: Mistral 7B LLM powered by Retrieval-Augmented Generation using ChromaDB for contextual, personalized security explanations.
  • FastAPI Backend: Async architecture supporting WebSocket connections for real-time scan updates and AI streaming responses.
  • React + TypeScript Frontend: Type-safe UI with gamification elements (XP, ranks, Digital Health Score) and interactive threat visualizations.
  • 100% Local Processing: Zero cloud dependencies—all AI inference, scanning, and data storage happens on-device, eliminating the "privacy tax."

Retrospective

Successes

All three hypotheses validated. The convergence of XAI, gamification, and local-first architecture proved effective for security education. The 54.2% jump in ransomware understanding demonstrates that conversational AI can function as a real-time security tutor.

Research honesty paid off. Acknowledging the 40.5% attrition rate and explaining that 5 participants struggled with installation showed intellectual integrity. The committee respected the transparency.

Challenges

PyInstaller packaging issues: ChromaDB's dynamic dependencies caused RAG corruption in the standalone executable. For production, installer-based deployment or alternative packaging solutions are necessary.

Motivation-behavior gap: High gamification motivation doesn't automatically translate to action. Users need enablement (assisted remediation) alongside motivation.

Defense Materials

Note: Final thesis document includes full methodology, statistical analysis, and comprehensive literature review.

Next Steps: From Research to Product

Phase 1 (proof-of-concept) is complete. The research validates that the approach works. Now begins the 12-18 month journey to production: web-based deployment, assisted remediation implementation, scale validation with N=100+, and ultimately commercial launch targeting 200M+ non-technical Americans.

Milestone 10 February 1, 2026

Engineering Intelligence: Performance Profiling & Adaptive AI

This week, NestShield evolved from a static dashboard into a reactive, intelligent system. The goal was to implement an "Autonomous Consultant" persona—an AI that doesn't just answer questions but analyzes system telemetry to propose remediation steps proactively.

The Challenge: CPU Bottlenecks

While integrating the "Always-On" agent, I encountered a critical performance regression. The global state listener, intended to sync the Dashboard risks with the Header notifications, triggered a race condition in the React rendering cycle. This caused an infinite loop, spiking the browser's Main Thread CPU usage to 100%.

The Solution: Ref-Based Latching

To resolve this, I re-engineered the Chatbot.tsx component using a Reference Latch architecture. By utilizing useRef to track message states outside the render cycle and implementing strict dependency management in useEffect, I eliminated the redundant reconciliations.

100%

CPU Load (Before)

705ms

Scripting Time (After)

16ms

INP Latency
Chrome DevTools Performance Profiler

Fig 1. Chrome DevTools confirming CPU idle state after optimization.


Retrospective

Successes

The Adaptive Persona logic is working flawlessly. The system now detects the user's "Gamification Level" and switches between using simple analogies (for Rookies) and technical jargon (for Experts) dynamically.

Challenges

Synchronizing the "Notification Bell" in the header with the Dashboard's scan results required lifting state up to a global ScanContext. This refactor was time-consuming but necessary for a cohesive UX.

Next Steps

Now that the AI can propose solutions, the next logical step is Automated Remediation. I will be writing Python scripts that allow the agent to actually execute fixes (like closing ports) upon user approval.

Milestone 6 December 21, 2025

From Concept to Execution: Profiling NestShield's Knowledge Engine

This week marked a pivotal shift from architectural planning to tangible backend implementation. The focus was Knowledge Ingestion—the process of teaching AEGIS (the AI Brain) to understand complex cybersecurity standards like NIST 800-53 and OWASP Top 10.

The Build

I engineered a Python-based ingestion pipeline (ingest_knowledge.py) utilizing LangChain concepts and ChromaDB for vector storage. The script performs four key actions:

  • Parsing: Extracts text from dense, unstructured PDFs using pypdf.
  • Chunking: Splits text into 1000-character overlapping segments to preserve context.
  • Embedding: Converts text into vector embeddings using a local Transformer model.
  • Storage: Indexes vectors into a persistent database for RAG (Retrieval-Augmented Generation).

Performance Profiling Results

A critical requirement for this milestone was performance testing. Using psutil integration and OS-level monitoring, I stress-tested the ingestion of over 600 pages of technical documentation.

2,068

Chunks Ingested

39.1s

Execution Time

733 MB

RAM Spike

The profiling revealed that the operation is heavily Memory-Bound. The significant RAM spike (~733 MB delta) confirms that loading the Transformer model and performing matrix multiplications for embeddings is the primary resource cost. CPU usage spiked in short bursts, which is typical for vectorization tasks.

CPU Profiler

Fig 1. OS-Level CPU Activity

Console Report

Fig 2. Script Performance Output


Retrospective

Successes

The error handling architecture proved robust. During testing, a corrupt ISO-27001 PDF failed to parse, but the script caught the exception, logged it, and continued processing the NIST and OWASP documents without crashing. This "fail-safe" design is crucial for production environments.

Challenges

Accurate CPU profiling within Python proved difficult. The library `psutil` often reported 0.0% CPU usage because the sampling interval missed the rapid micro-bursts of the vector calculations. Moving to OS-level monitoring (Resource Monitor) was necessary to get the full picture.

Next Steps

With the "Brain" now active, the next phase is connecting the React Frontend to this knowledge base, allowing users to ask natural language questions about the documents I just ingested.

Milestone 1-5 November 23, 2025

Laying the Foundation: Research & Architecture

The path to building robust software begins long before the first line of code is written. This month, in the Research, Planning, and Design phase of my Master's Capstone, I focused on transforming NestShield from a concept into a tangible architectural plan.

Features & Architecture

My primary goal this month was to design the collaborative intelligence framework. I utilized Python for the backend logic planning and created high-level diagrams to map out the user flow. The biggest challenge was determining how to handle data privacy within a collaborative environment.

Architecture Diagram

Fig 3. Initial Architecture Flow


Retrospective

What went right?

I successfully defined the core "problem statement" for NestShield. By attending the "EstiMate" defense presentation, I learned the critical importance of scoping. I narrowed my focus specifically to the collaborative intelligence aspect.

What went wrong?

Time management was a hurdle. Balancing technical research on Python libraries with the academic requirements of the proposal paper led to some late nights.