The AI Engine (interpretation & prioritization)
Purpose. Turn heterogeneous events into ranked, explainable incidents. The engine runs centrally (or on-prem) and combines behavioral baselining, graph correlation, and few-shot signatures learned from prior incidents.
Pillars
Behavioral baselines: rolling profiles per host/user/repo (hour-of-day, peer deviation, seasonal patterns).
Graph reasoning: merges process trees, network edges, IAM events into a security interaction graph, enabling path-based features (e.g., signed admin tool → unsigned loader → off-net egress).
Semi-supervised learning: isolates novelty without full labels; curates analyst feedback to refine.
Federated updates (optional): sites train locally and share model deltas, not raw data.
Outputs
Incident object with severity, confidence, affected assets, recommended action, and rationale:
top contributing features (SHAP-like),
matching patterns (e.g., “living-off-the-land + cloud exfil pattern”),
remediation playbook suggestions.
Performance targets (design, not SLA)
End-to-end triage < 2–5s from agent emission on typical corp networks.
False-positive reduction vs. rule-only pipelines: target ≥40–60% with human-in-the-loop tuning.
Analyst time saved: fewer tickets per incident via auto-grouping of correlated events.
Example rationale (analyst view)
Severity: High (0.89) — Unusual rclone spawn under signed Office parent; first-seen destination; bursty file hash churn; off-hours user; peer group deviation p<0.01. Matches “exfil-via-sync” playbook (76% similarity).
Last updated
