Skip to content

st-mn/autodr

Repository files navigation

AUTODR: Automated Threat Hunting & Incident Response System with Vertex AI

AUTODR is an ML-powered security orchestration and automated response platform that unifies threat detection, hunting, investigation, and remediation into a single cohesive system. By integrating industry-leading security tools—Wazuh and MISP (optionally Splunk and CrowdStrike)—with Google Vertex AI machine learning, Shuffle SOAR orchestration, and DFIR-IRIS case management, AUTODR transforms reactive security operations into proactive, intelligent defense.

Core Capabilities

AI-Powered Threat Detection

AUTODR leverages Google Vertex AI for advanced machine learning that enhances detection accuracy and reduces false positives:

  • Anomaly Detection: Unsupervised learning identifies unusual patterns in network traffic, user behavior, and system activity
  • Threat Classification: Multi-class supervised models assign precise threat scores (0–1 probability) to alerts and events
  • Real-Time Inference: Cloud-based model deployment via Cloud Run enables sub-second threat scoring at scale
  • Multi-Source Feature Engineering: Unified data integration from Wazuh, Splunk, and CrowdStrike for comprehensive visibility
  • Intelligent Response Triggering: ML confidence thresholds drive automated remediation workflows
  • Continuous Learning: Models retrain on new threats and incorporate analyst feedback

Comprehensive Data Collection

  • Multi-Source Integration: Unified collection from Splunk SIEM, CrowdStrike Falcon EDR, and Wazuh XDR
  • Custom Agent: Bespoke Developed Agent that cand be adjusted and used to collect data and perform actions on bespoke OS or infrastructure
  • Real-Time Streaming: Google Cloud Pub/Sub and Dataflow for high-throughput event processing
  • Data Normalization: Standardized schema across all security sources for consistent analysis
  • BigQuery Data Lake: Centralized storage enabling historical analysis and model training

Automated Response & Orchestration

  • Incident Response Automation: Pre-built runbooks for endpoint isolation, IP blocking, user account management, and threat containment
  • Shuffle SOAR Integration: Visual workflow designer with 100+ app integrations for complex security orchestration
  • Zero-Touch Remediation: Automated response actions triggered by ML confidence thresholds
  • MITRE ATT&CK-Mapped Playbooks: Extensive collection of response procedures aligned with attack frameworks

Collaborative Investigation

AUTODR integrates DFIR-IRIS for multi-analyst investigation workflows:

  • Collaborative Case Management: Role-based access control with multi-user investigation workspaces
  • Evidence Chain of Custody: Forensic-grade artifact tracking and timeline analysis
  • IOC Management: Automatic indicator extraction, tracking, and MISP synchronization
  • Team Coordination: Task assignment, shared notes, and real-time collaboration

Integration Pipeline: Detect (Wazuh) → Orchestrate (Shuffle) → Investigate (IRIS)

Threat Intelligence Integration

  • MISP Platform: Bi-directional threat intelligence sharing and enrichment
  • Automated IOC Enrichment: Real-time lookups for file hashes, IPs, domains, and URLs
  • Community Intelligence: Access to global threat intelligence feeds and indicator sharing
  • Custom Intel Feeds: Support for proprietary and third-party threat intelligence sources

Enterprise Architecture

  • Modular Design: Easily extensible with new hunts, runbooks, data sources, and integrations
  • Cloud-Native Scalability: Leverages Google Cloud Platform for horizontal scaling and high availability
  • Multi-Platform Support: Unified security operations across Windows, Linux, macOS, and cloud workloads
  • API-First Design: RESTful APIs for all components enable custom integrations
  • Containerized Deployment: Docker Compose orchestration for simplified deployment and management

System Architecture

graph TB
    subgraph Endpoints["ENDPOINTS & AGENTS"]
        MacOS["macOS Endpoint<br/>Wazuh Agent"]
        Linux["Linux Endpoint<br/>Wazuh Agent"]
        Debian["Debian Endpoint<br/>Wazuh Agent"]
        Windows["Windows Endpoint<br/>Wazuh Agent"]
        CustomAgent["Custom Endpoint<br/>Custom Agent"]
    end

    subgraph SecurityTools["SECURITY TOOLS"]
        MISP["MISP<br/>Threat Intelligence"]
        WazuhManager["Wazuh Manager<br/>Central Monitoring"]
        Splunk["Splunk SIEM<br/>Log Analysis"]
        CrowdStrike["CrowdStrike Falcon<br/>Endpoint Protection"]
    end

    subgraph DataCollection["DATA COLLECTION LAYER"]
        WazuhCollector["wazuh/<br/>Wazuh Collector"]
        SplunkCollector["splunk/<br/>Splunk Collector"]
        CrowdStrikeCollector["crowdstrike/<br/>CrowdStrike Collector"]
    end

    subgraph GCP["GOOGLE CLOUD PLATFORM"]
        PubSub["Pub/Sub<br/>Event Streaming"]
        Dataflow["Dataflow<br/>Stream Processing"]
        BigQuery["BigQuery<br/>Data Warehouse"]
        VertexAI["Vertex AI<br/>ML Platform"]
        CloudRun["Cloud Run<br/>Inference Service"]
    end

    subgraph AutomationLayer["AUTOMATION & ORCHESTRATION"]
        AUTODR["AUTODR Engine<br/>autodr.py"]
        AutoHunt["autohunt/<br/>Threat Hunting"]
        AutoBook["autobook/<br/>IR Runbooks"]
        MLPipeline["vertex/<br/>ML Pipeline"]
        Shuffle["shuffle/<br/>SOAR Workflows"]
    end

    subgraph CaseManagement["CASE MANAGEMENT & COLLABORATION"]
        IRIS["iris/<br/>DFIR-IRIS Platform"]
        IRISWeb["IRIS Web UI<br/>Collaborative Investigation"]
        IRISTimeline["Timeline Analysis<br/>Evidence Tracking"]
        IRISIOC["IOC Management<br/>Asset Tracking"]
    end

    subgraph ResponseActions["RESPONSE & ACTIONS"]
        AlertQueue["Alert Queue<br/>ML Scoring"]
        ShuffleWorkflows["Shuffle Workflows<br/>Visual Automation"]
        ResponsePlaybooks["AutoBook Runbooks<br/>Automated Remediation"]
        NotificationEngine["Notification Engine<br/>Alerts & Updates"]
        CrowdStrikeResponse["crowdstrike/<br/>Host Isolation"]
        SplunkAlert["splunk/<br/>High Priority Alerts"]
        MISPIntegration["misp/<br/>IOC Management"]
    end

    MacOS --> WazuhManager
    Linux --> WazuhManager
    Debian --> WazuhManager
    Windows --> WazuhManager
    CustomAgent --> WazuhManager

    WazuhManager --> WazuhCollector
    MISP --> WazuhManager
    Splunk --> SplunkCollector
    CrowdStrike --> CrowdStrikeCollector

    WazuhCollector --> PubSub
    SplunkCollector --> PubSub
    CrowdStrikeCollector --> PubSub

    PubSub --> Dataflow
    Dataflow --> BigQuery
    BigQuery --> VertexAI
    VertexAI --> CloudRun

    CloudRun --> AUTODR
    BigQuery --> MLPipeline
    MLPipeline --> AUTODR

    AUTODR --> AutoHunt
    AUTODR --> AutoBook
    AUTODR --> Shuffle
    AUTODR --> IRIS

    AutoHunt --> AlertQueue
    Shuffle --> ShuffleWorkflows
    ShuffleWorkflows --> AlertQueue
    AlertQueue --> ResponsePlaybooks
    AlertQueue --> IRIS

    ResponsePlaybooks --> NotificationEngine
    ResponsePlaybooks --> CrowdStrikeResponse
    ResponsePlaybooks --> SplunkAlert
    ResponsePlaybooks --> MISPIntegration

    IRIS --> IRISWeb
    IRIS --> IRISTimeline
    IRIS --> IRISIOC
    
    AutoHunt -.->|Hunt Evidence| IRIS
    ResponsePlaybooks -.->|Containment Actions| IRIS
    AlertQueue -.->|High Severity Cases| IRIS

    CrowdStrikeResponse -.-> CrowdStrike
    SplunkAlert -.-> Splunk
    MISPIntegration -.-> MISP
    IRISIOC -.->|IOC Sync| MISP

    classDef endpoint fill:#e1f5ff,stroke:#01579b,stroke-width:2px
    classDef security fill:#fff3e0,stroke:#e65100,stroke-width:2px
    classDef collection fill:#f3e5f5,stroke:#4a148c,stroke-width:2px
    classDef gcp fill:#e8f5e9,stroke:#1b5e20,stroke-width:2px
    classDef automation fill:#fce4ec,stroke:#880e4f,stroke-width:2px
    classDef response fill:#ffe0b2,stroke:#e65100,stroke-width:2px
    classDef casemanagement fill:#e3f2fd,stroke:#0d47a1,stroke-width:3px

    class MacOS,Linux,Debian,Windows endpoint
    class WazuhManager,Splunk,CrowdStrike,MISP security
    class WazuhCollector,SplunkCollector,CrowdStrikeCollector collection
    class PubSub,Dataflow,BigQuery,VertexAI,CloudRun gcp
    class AUTODR,AutoHunt,AutoBook,MLPipeline,Shuffle automation
    class IRIS,IRISWeb,IRISTimeline,IRISIOC casemanagement
Loading

Modules

AutoBook: Incident Response Modules

Sample runbooks (also available at github.com/st-mn/autobook):

  • 00_wannacry_ir_runbook.ipynb — Wannacry Incident Response Automation

AutoHunt: Threat Hunting Modules

Sample hunts (also available at github.com/st-mn/autohunt):

  • 00_wannacry_hunt.py — Wannacry Threat Hunt Automation

Run Specific Workflows

ML Pipeline Operations

Run Complete ML Pipeline

python ml_pipeline.py

Collect Data from Security Sources

python splunk_data_collector.py      # Splunk
python crowdstrike_data_collector.py # CrowdStrike
python wazuh_data_collector.py       # Wazuh

Process and Train ML Model

python data_normalizer.py        # Normalize collected data
python feature_engineering.py    # Extract features
python vertex/ml_model.py        # Train ML model

Threat Hunting & Incident Response

List and Run Hunts

python autodr.py --list-hunts           # List available hunts
python autodr.py hunt 00_dns_tunneling  # Run specific hunt

List and Run Runbooks

python autodr.py --list-runbooks                      # List available runbooks
python autodr.py runbook 00_isolate_endpoint --step   # Run stepwise
python autodr.py runbook 00_isolate_endpoint --full   # Run full automation

Automated Response Testing

python crowdstrike/crowdstrike_response.py  # Test CrowdStrike integration
python splunk/splunk_alert.py               # Test Splunk alert creation
python misp/misp_integration.py             # Test MISP IOC addition

© 2026 Stan Toman

About

AutoDR is an automated threat hunting and incident response system using ML based behavioral detection integrating multiple platforms with AutoHunt for automated threat hunting routines and AutoBook for incident response automation.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors