CyberNeuro-RT
An IoT, AI/ML-driven, highly-scalable, real-time network defense & threat intelligence tool with CPU, GPU or low-power neuromorphic chip deployment
A Quantum Ventura, Lockheed Martin, and Penn State Innovation
Quantum Ventura’s CyberNeuro-RT (CNRT) technology offering has been developed in partnership with Lockheed Martin Co.’s MFC Division and Pennsylvania State University under partial funding from the U.S. Department of Energy.
Cutting-Edge Unsupervised ML
Scalable Unsupervised Outlier Detection (SUOD)
- 6 ML Algo EnsembleModel Approximation for Complex Models
Variational Autoencoder (VAE)
- ETrained to Minimize Reconstruction Error of initial input and reconstructed output
75x Dataset Growth in Under 2 Months
- Existing Dataset Ingestion: Proprietary system enables ingestion of any existing network capture dataset with flexible support for any labelling system
- From-the-wild Zero Day Sampling: System enables capturing and simulation of novel threats for additional data sampling
- Data Generation via Simulation: ThreatATI database and proprietary ingestion system enable sampling and augmentation for cataloged threats from proprietary and public threat databases
Proprietary Pipeline Adapts to Any Dataset
Follow Threats Home with Dark Web Tracking
At-the-edge Neuromorphic Processing
- Two offerings from the leading neuromorphic developers: Intel and Brainchip
- Small form factor, magnitudes less power consumption than GPU
- On-chip learning for deployment network specific attack detection
Intel Loihi
Brainchip Akida
Dashboards Minimizes Operator Fatigue
Robust, Multi-Faceted, User-Friendly Cyber Analyst Dashboard prevents Operator Fatigue that Allows Cyber Attacks To Happen
- Large numbers of false alarms cause real threats to be missed
- False alarms fatigue the cyber analyst further increasing risk of missed threats
The Cyber Neuro-RT dashboard is designed to minimize all sources of analyst fatigue while presenting timely and meaningful data insights
- Al based false alarms are minimized (trained for minimal false positive rate) for cataloged threats from proprietary and public threat databases
- Possible threats are ranked by importance and confidence
- Only the most relevant and likely alarms are actioned upon