AUTODR is an ML-powered security orchestration and automated response platform that unifies threat detection, hunting, investigation, and remediation into a single cohesive system. By integrating industry-leading security tools—Wazuh and MISP (optionally Splunk and CrowdStrike)—with Google Vertex AI machine learning, Shuffle SOAR orchestration, and DFIR-IRIS case management, AUTODR transforms reactive security operations into proactive, intelligent defense.
AUTODR leverages Google Vertex AI for advanced machine learning that enhances detection accuracy and reduces false positives:
- Anomaly Detection: Unsupervised learning identifies unusual patterns in network traffic, user behavior, and system activity
- Threat Classification: Multi-class supervised models assign precise threat scores (0–1 probability) to alerts and events
- Real-Time Inference: Cloud-based model deployment via Cloud Run enables sub-second threat scoring at scale
- Multi-Source Feature Engineering: Unified data integration from Wazuh, Splunk, and CrowdStrike for comprehensive visibility
- Intelligent Response Triggering: ML confidence thresholds drive automated remediation workflows
- Continuous Learning: Models retrain on new threats and incorporate analyst feedback
- Multi-Source Integration: Unified collection from Splunk SIEM, CrowdStrike Falcon EDR, and Wazuh XDR
- Custom Agent: Bespoke Developed Agent that cand be adjusted and used to collect data and perform actions on bespoke OS or infrastructure
- Real-Time Streaming: Google Cloud Pub/Sub and Dataflow for high-throughput event processing
- Data Normalization: Standardized schema across all security sources for consistent analysis
- BigQuery Data Lake: Centralized storage enabling historical analysis and model training
- Incident Response Automation: Pre-built runbooks for endpoint isolation, IP blocking, user account management, and threat containment
- Shuffle SOAR Integration: Visual workflow designer with 100+ app integrations for complex security orchestration
- Zero-Touch Remediation: Automated response actions triggered by ML confidence thresholds
- MITRE ATT&CK-Mapped Playbooks: Extensive collection of response procedures aligned with attack frameworks
AUTODR integrates DFIR-IRIS for multi-analyst investigation workflows:
- Collaborative Case Management: Role-based access control with multi-user investigation workspaces
- Evidence Chain of Custody: Forensic-grade artifact tracking and timeline analysis
- IOC Management: Automatic indicator extraction, tracking, and MISP synchronization
- Team Coordination: Task assignment, shared notes, and real-time collaboration
Integration Pipeline: Detect (Wazuh) → Orchestrate (Shuffle) → Investigate (IRIS)
- MISP Platform: Bi-directional threat intelligence sharing and enrichment
- Automated IOC Enrichment: Real-time lookups for file hashes, IPs, domains, and URLs
- Community Intelligence: Access to global threat intelligence feeds and indicator sharing
- Custom Intel Feeds: Support for proprietary and third-party threat intelligence sources
- Modular Design: Easily extensible with new hunts, runbooks, data sources, and integrations
- Cloud-Native Scalability: Leverages Google Cloud Platform for horizontal scaling and high availability
- Multi-Platform Support: Unified security operations across Windows, Linux, macOS, and cloud workloads
- API-First Design: RESTful APIs for all components enable custom integrations
- Containerized Deployment: Docker Compose orchestration for simplified deployment and management
graph TB
subgraph Endpoints["ENDPOINTS & AGENTS"]
MacOS["macOS Endpoint<br/>Wazuh Agent"]
Linux["Linux Endpoint<br/>Wazuh Agent"]
Debian["Debian Endpoint<br/>Wazuh Agent"]
Windows["Windows Endpoint<br/>Wazuh Agent"]
CustomAgent["Custom Endpoint<br/>Custom Agent"]
end
subgraph SecurityTools["SECURITY TOOLS"]
MISP["MISP<br/>Threat Intelligence"]
WazuhManager["Wazuh Manager<br/>Central Monitoring"]
Splunk["Splunk SIEM<br/>Log Analysis"]
CrowdStrike["CrowdStrike Falcon<br/>Endpoint Protection"]
end
subgraph DataCollection["DATA COLLECTION LAYER"]
WazuhCollector["wazuh/<br/>Wazuh Collector"]
SplunkCollector["splunk/<br/>Splunk Collector"]
CrowdStrikeCollector["crowdstrike/<br/>CrowdStrike Collector"]
end
subgraph GCP["GOOGLE CLOUD PLATFORM"]
PubSub["Pub/Sub<br/>Event Streaming"]
Dataflow["Dataflow<br/>Stream Processing"]
BigQuery["BigQuery<br/>Data Warehouse"]
VertexAI["Vertex AI<br/>ML Platform"]
CloudRun["Cloud Run<br/>Inference Service"]
end
subgraph AutomationLayer["AUTOMATION & ORCHESTRATION"]
AUTODR["AUTODR Engine<br/>autodr.py"]
AutoHunt["autohunt/<br/>Threat Hunting"]
AutoBook["autobook/<br/>IR Runbooks"]
MLPipeline["vertex/<br/>ML Pipeline"]
Shuffle["shuffle/<br/>SOAR Workflows"]
end
subgraph CaseManagement["CASE MANAGEMENT & COLLABORATION"]
IRIS["iris/<br/>DFIR-IRIS Platform"]
IRISWeb["IRIS Web UI<br/>Collaborative Investigation"]
IRISTimeline["Timeline Analysis<br/>Evidence Tracking"]
IRISIOC["IOC Management<br/>Asset Tracking"]
end
subgraph ResponseActions["RESPONSE & ACTIONS"]
AlertQueue["Alert Queue<br/>ML Scoring"]
ShuffleWorkflows["Shuffle Workflows<br/>Visual Automation"]
ResponsePlaybooks["AutoBook Runbooks<br/>Automated Remediation"]
NotificationEngine["Notification Engine<br/>Alerts & Updates"]
CrowdStrikeResponse["crowdstrike/<br/>Host Isolation"]
SplunkAlert["splunk/<br/>High Priority Alerts"]
MISPIntegration["misp/<br/>IOC Management"]
end
MacOS --> WazuhManager
Linux --> WazuhManager
Debian --> WazuhManager
Windows --> WazuhManager
CustomAgent --> WazuhManager
WazuhManager --> WazuhCollector
MISP --> WazuhManager
Splunk --> SplunkCollector
CrowdStrike --> CrowdStrikeCollector
WazuhCollector --> PubSub
SplunkCollector --> PubSub
CrowdStrikeCollector --> PubSub
PubSub --> Dataflow
Dataflow --> BigQuery
BigQuery --> VertexAI
VertexAI --> CloudRun
CloudRun --> AUTODR
BigQuery --> MLPipeline
MLPipeline --> AUTODR
AUTODR --> AutoHunt
AUTODR --> AutoBook
AUTODR --> Shuffle
AUTODR --> IRIS
AutoHunt --> AlertQueue
Shuffle --> ShuffleWorkflows
ShuffleWorkflows --> AlertQueue
AlertQueue --> ResponsePlaybooks
AlertQueue --> IRIS
ResponsePlaybooks --> NotificationEngine
ResponsePlaybooks --> CrowdStrikeResponse
ResponsePlaybooks --> SplunkAlert
ResponsePlaybooks --> MISPIntegration
IRIS --> IRISWeb
IRIS --> IRISTimeline
IRIS --> IRISIOC
AutoHunt -.->|Hunt Evidence| IRIS
ResponsePlaybooks -.->|Containment Actions| IRIS
AlertQueue -.->|High Severity Cases| IRIS
CrowdStrikeResponse -.-> CrowdStrike
SplunkAlert -.-> Splunk
MISPIntegration -.-> MISP
IRISIOC -.->|IOC Sync| MISP
classDef endpoint fill:#e1f5ff,stroke:#01579b,stroke-width:2px
classDef security fill:#fff3e0,stroke:#e65100,stroke-width:2px
classDef collection fill:#f3e5f5,stroke:#4a148c,stroke-width:2px
classDef gcp fill:#e8f5e9,stroke:#1b5e20,stroke-width:2px
classDef automation fill:#fce4ec,stroke:#880e4f,stroke-width:2px
classDef response fill:#ffe0b2,stroke:#e65100,stroke-width:2px
classDef casemanagement fill:#e3f2fd,stroke:#0d47a1,stroke-width:3px
class MacOS,Linux,Debian,Windows endpoint
class WazuhManager,Splunk,CrowdStrike,MISP security
class WazuhCollector,SplunkCollector,CrowdStrikeCollector collection
class PubSub,Dataflow,BigQuery,VertexAI,CloudRun gcp
class AUTODR,AutoHunt,AutoBook,MLPipeline,Shuffle automation
class IRIS,IRISWeb,IRISTimeline,IRISIOC casemanagement
Sample runbooks (also available at github.com/st-mn/autobook):
00_wannacry_ir_runbook.ipynb— Wannacry Incident Response Automation
Sample hunts (also available at github.com/st-mn/autohunt):
00_wannacry_hunt.py— Wannacry Threat Hunt Automation
Run Complete ML Pipeline
python ml_pipeline.pyCollect Data from Security Sources
python splunk_data_collector.py # Splunk
python crowdstrike_data_collector.py # CrowdStrike
python wazuh_data_collector.py # WazuhProcess and Train ML Model
python data_normalizer.py # Normalize collected data
python feature_engineering.py # Extract features
python vertex/ml_model.py # Train ML modelList and Run Hunts
python autodr.py --list-hunts # List available hunts
python autodr.py hunt 00_dns_tunneling # Run specific huntList and Run Runbooks
python autodr.py --list-runbooks # List available runbooks
python autodr.py runbook 00_isolate_endpoint --step # Run stepwise
python autodr.py runbook 00_isolate_endpoint --full # Run full automationpython crowdstrike/crowdstrike_response.py # Test CrowdStrike integration
python splunk/splunk_alert.py # Test Splunk alert creation
python misp/misp_integration.py # Test MISP IOC addition© 2026 Stan Toman