Research Domain

Explainable AI, deception, secure logging, and automated response.

The domain is narrowed around SME endpoint security where users need trustworthy, readable, and actionable threat evidence without operating a full enterprise SOC.

Research Gap

SMEs need more than a cheaper EDR

Existing tools are often expensive, complex, resource-heavy, or difficult to interpret. ForLens addresses the gap with explainable insider-threat detection, endpoint-level deception, dynamic response automation, and forensic integrity.

Endpoint agent

Endpoint Data Collection Agent

Separates telemetry collection from detection logic, keeping the agent lightweight while forwarding events securely to the analysis engine.

AI detection engine

Behavioral Detection Engine

Combines Isolation Forest, LSTM autoencoder concepts, threat intelligence, and MITRE mapping for context-rich anomaly scoring.

Secure storage

Cryptographic Log Integrity

Uses tamper-evident storage concepts to make incident evidence easier to validate during response and reporting.

SOAR dashboard

SOAR-Style Dashboard

Supports role-aware risk scoring, admin notifications, quarantine visibility, recommended playbooks, and readable reports.

Proposal Alignment

Research objectives translated into product requirements

Objective 01

Lightweight Endpoint Agent

Plug-and-play telemetry collection with less than 10% endpoint overhead target.

Objective 02

AI Behavior Modeling

Isolation Forest, LSTM autoencoder concepts, and threat intelligence correlation for high-confidence alerts.

Objective 03

Tamper-Evident Logging

Cryptographic evidence integrity so incident records can be verified after an attack.

Objective 04

SOAR-Style Response

Role-aware risk scoring, playbooks, quarantine notifications, and readable executive reporting.

System Flow

From endpoint event to business-ready action

  1. Endpoint agent records process, file, registry, network, and honeypot events.
  2. Telemetry is normalized and enriched with threat intelligence and behavioral context.
  3. The engine produces severity, confidence, rationale, and MITRE technique mapping.
  4. The dashboard recommends or executes SOAR actions such as isolate, block, terminate, notify, and report.
  5. Tamper-evident logs preserve verification evidence for later review.
ForLens architecture diagram