Skip to content
@Automatic-Case-Investigator

Automatic Case Investigator

An on-premise software stack aimed to automate common SOC investigation tasks with AI agents, specifically by performing automated investigations in Security Information and Event Management (SIEM) systems. This software stack ingests security case information, generates investigation tasks, and automatically perform relevant investigations in SIEM. Models used including LLM for generation tasks and custom-designed classifier model for security event correlation.


The Problem

  • A single attacker can trigger a security incident, but incident response often requires many SOC analysts.
  • Analysts must review and investigate large volumes of security logs, which leads to:
    • Information fatigue: risking missed evidence and reduced effectiveness
    • Limited specialization: analysts may not have expertise across all areas
    • High effort: correlating security logs is a labor-intensive task

Features

Investigation Procedures Generation

Automatic Investigation

  • Analyzes case data and available configurations (Eg. detection rulesets) to generate precise SIEM queries
  • Iteratively queries the SIEM and evaluates potential Indicators of Compromise (IoC)
  • Helps SOC analysts quickly locate pertinent logs, minimizing manual effort

Supported platforms

SOAR

SIEM


Tentative Goals

  • Developing workflow for automatically investigating cases when they are added to SOAR
  • Developing a pipeline to generate incident response reports based on automatic investigation results
  • Implement a live investigation mode that allows users to observe the investigation process as it happens
  • Implement dynamic schema enrichment to retrieve additional field context before generating queries, improving query quality and relevance
  • Add settings to allow users to use external models
  • Developing a generalized scheme allowing human SOC analysts to establish baselines in their organizational settings
  • Perform an APT style adversarial emulation for testing

Demo

cases

Figure 1. List of security cases retrieved from the SOAR platform (e.g., TheHive).

case

Figure 2. Detailed information for a selected case retrieved from the SOAR platform (e.g., TheHive).

automations

Figure 3. Available automation workflows that can be executed for the selected case.

tasks

Figure 4. Investigation tasks automatically generated for the case.

rev_shell

Figure 5. Automated investigation identifying a potential implanted reverse shell.

rev_shell_log

Figure 6. Evidence log retrieved by the automated investigation showing the reverse shell activity.

Popular repositories Loading

  1. SOC-Stack SOC-Stack Public

    The SOC technology stack used for testing

    Dockerfile

  2. .github .github Public

  3. ACI_Backend ACI_Backend Public

    The main on-premise backend of the automatic case investigator

    Python

  4. Jupyterhub_Stack Jupyterhub_Stack Public

    Jupyterhub stack for AI development with tensorflow and cuda preconfigured

    Python

  5. ACI_Dashboard ACI_Dashboard Public

    The main on-premise frontend of the automatic case investigator

    TypeScript

  6. ACI_AI_Backend ACI_AI_Backend Public

    On-premise AI backend for Automatic Case Investigator

    Python

Repositories

Showing 8 of 8 repositories

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…