System Monitor: Threat Detection Logic

Overview

This protocol defines the Threat Analysis pipeline used to detect Malicious Activity/Fraud across community-driven signals, third-party feeds, and automated validation. The system is designed for cyber risk containment, rapid triage, and high-fidelity evidence handling.


1) Data Ingestion (Community Signals)

Community Signals are ingested as structured reports and normalized for downstream correlation:

  • Indicators: phone numbers, bank accounts, social handles, URLs.
  • Evidence: screenshots, chat logs, media artifacts.
  • Normalization: canonical phone format, consistent alias mapping, and deduplication.

Ingestion also supports external threat feeds via crawler-based pipelines, converting raw HTML into structured JSON for correlation and scoring.

Community Signals / External Feeds
  -> Normalize (phone, bank, social, url)
    -> Deduplicate
      -> Queue for verification

2) AI Verification (Semantic + OCR Evidence)

AI verification enforces data quality and signal integrity before exposure:

  • Semantic validation to reduce noisy or irrelevant reports.
  • OCR evidence extraction from images to verify account identifiers.
  • Two-stage review with queue locks to prevent race conditions.
{
  "signal_type": "bank_account",
  "indicator": "0123456789",
  "evidence": {
    "image_ocr": "BANK: ABC | ACCOUNT: 0123456789",
    "semantic_score": 0.92
  },
  "verdict": "validated"
}

3) Real-time Post-Audit

Real-time post-audit enforces continuous verification and prevents stale or malicious data from propagating:

  • Batch scanning over queued signals with strict state gates.
  • Link extraction using AI to normalize indicators into canonical JSON.
  • Two-layer storage: fast lookup via MongoDB, full case details via SQL.
  • Masking & safe exposure to protect sensitive fields in public results.
Signals (Processing)
  -> Post-Audit Batch
    -> Normalize Links / Indicators
      -> Update Status (Validated / Rejected)
        -> Index for Search

Threat Analysis Outcomes

Validated signals are promoted into the Threat Intelligence index, enabling:

  • Real-time lookup for suspicious entities.
  • Risk flags for known Malicious Activity/Fraud patterns.
  • Community feedback loops to continuously improve coverage.

This design delivers a modern, defense-in-depth threat detection system that prioritizes evidence integrity, minimizes false positives, and supports rapid incident response workflows.