SCBE-AETHERMOORE

Security Systems Catalog

Every detection, response, and counter-attack module in the SCBE security stack. All priced by one law.

H(d, R) = R(d²)

Patent Pending — USPTO #63/961,403

Core Engine

Hyperbolic Cost Engine

The single decision point. Every system feeds through this. One formula, one verdict.

Cost Engine LIVE

Central pricing function for all attack vectors

FormulaH(d,R) = R^(d²)
Inputsdepth (d), radius (R), Sacred Tongue domain
Outputscost, cost_class, blocked (bool), verdict dict
Tongue WeightsKO=1.0, AV=1.618, RU=2.618, CA=4.236, UM=6.854, DR=11.09
Cost ClassesTRIVIAL <10 | LOW <1K | MODERATE <1M | HIGH <1T | PRICED_OUT
RAM<5MB
DependenciesNone (pure Python)
DomainALL TONGUES

Event Correlator SPEC

Cross-component event correlation via sliding windows

MethodSQLite event bus, sliding window queries
IntegrationAll monitors + tripwires write events; correlator reads
Key FeatureSame IP across 2+ systems = summed depth. Exponential cost compound.
ExamplePort scan (d=2) + canary touch (d=5) = d=7 → cost explodes
RAM~5MB (SQLite in-process)
Disk~1MB/day at 1 event/sec
Latency<10ms per correlation
DomainKO Control & Orchestration

SOAR Playbook Engine SPEC

Automated response orchestration via directed action graphs

MethodDAG of conditional actions: trigger → decision → action
EscalationOBSERVE → ALERT → COUNTER → LOCKDOWN
ActionsLog, alert, evidence collect, block, tarpit redirect, forensic dump
Approval GatesDestructive actions require human confirmation
Concept FromEnterprise SOAR (Splunk SOAR, Cortex XSOAR)
RAM<10MB
DomainKO Control & Orchestration
Detection

Detection Systems

Eyes on the network, filesystem, and processes. Each feeds the cost engine.

Port Watcher LIVE

Monitors listening ports, flags unknown services

Methodss -tlnp polling
Depth ModelFixed d=2.0 (port exposure layer)
Radius Modelport_number / 1000 (higher port = wider scope)
Interval30s default (configurable)
False Positives~30% (dev servers flag as unknown)
RAM<5MB
DomainAV I/O & Messaging

Connection Tracker LIVE

Monitors active TCP connections, detects repeat offenders

Methodss -tnp polling + IP counting
Depth Model1.0 + (0.5 × repeat_count), caps at d=6
Radius Model1.5 for standard ports, 3.0+ for unusual ports
Interval60s default
False Positives~40% (flags legitimate API connections)
RAM<5MB
DomainUM Security & Privacy

Scapy Packet IDS SPEC

Real-time packet inspection with custom detection rules

Methodscapy.sniff() with BPF filters, per-packet callback
DetectsSYN floods, port scans, payload anomalies, protocol violations
Depth ModelRule-dependent: scan=2, exploit=3, payload_anomaly=4
Latency<1ms per packet
Throughput~10K packets/sec on Celeron N4020
RequiresCAP_NET_RAW or root
RAM40-80MB
DomainAV I/O & Messaging

Behavioral Baseline Engine SPEC

Learns "normal" from /proc, alerts on statistical anomalies

Method/proc sampling + EWMA (alpha=0.1) + 3-sigma alerting
BaselinesProcess count, FD count, connection count, outbound bytes, DNS entropy
Warm-up1-2 hours before baselines are meaningful
Depth Modelsigma_deviation / 2 (3-sigma = d=1.5, 6-sigma = d=3)
Radius ModelLearned from baseline — replaces static values
False Positives~10% after warm-up, ~80% during warm-up
RAM~20MB for 1000 entities
Concept FromDarktrace NDR, Zeek behavioral analysis
DomainCA Logic & Computation

Entropy Analyzer SPEC

Shannon entropy of payloads and DNS queries. Spikes = exfil or encoding.

MethodShannon entropy: H = -Σ p(x) log2 p(x)
DetectsEncrypted exfiltration, base64 C2 comms, DNS tunneling
ThresholdNormal text ~4.5 bits, encrypted >7.5 bits
Depth Modelentropy / 2 (7.5 bits = d=3.75)
RAM<5MB
Implementation~30 lines Python
DomainCA Logic & Computation

Rootkit Scanner SPEC

Wraps rkhunter + chkrootkit with cost engine integration

Toolsrkhunter + chkrootkit (run both, different coverage)
Depth ModelRootkit finding = d=5 (kernel-level compromise)
Radius ModelR=10 (full system access implied)
ScheduleDaily cron scan
LimitationCannot detect kernel-level rootkits reliably
RAM<30MB during scan
DomainUM Security & Privacy

Traffic Analyzer (tshark) SPEC

Deep packet inspection and protocol dissection

Methodtshark capture + custom filter scripts
ProtocolsHTTP, DNS, TLS (JA3 fingerprint), SMB, SSH
Depth ModelProtocol anomaly severity mapping
OutputPCAP files + structured JSON for correlator
RAM30-80MB per capture session
DiskPCAP rotation: 24h retention
DomainAV I/O & Messaging

File Integrity Monitor (AIDE) SPEC

Full-system file integrity verification via AIDE

MethodAIDE database comparison: baseline vs current
ScopeAll binaries, configs, system files
ScheduleDaily cron, results fed to cost engine
Depth ModelBinary change = d=4, config change = d=2.5
RAM<50MB during scan
Disk~5MB for database
DomainDR Types & Structures

Process Genealogy Tracker SPEC

Builds process parent-child DAGs, scores suspicious lineage

Method/proc traversal, build process trees, score chains
DetectsShell spawned by web server, unexpected privilege chains
Depth ModelProcess tree depth = attack depth d
Concept FromCrowdStrike Storylines, SentinelOne DAGs
RAM~15MB
DomainRU Policy & Constraints
Integrity & Tripwires

Integrity Systems

Canaries, Merkle trees, and cryptographic proof. Any tampering hits the cost engine.

Canary Tripwires LIVE

Decoy files that should never be touched. Any access = alarm.

MethodSHA-256 baseline + periodic check
CanariesFake .env, credentials, SSH keys
Depth ModelCanary touch = d=5 (deep intrusion confirmed)
False Positives~0% (no legitimate access to canary files)
RAM<5MB
DomainUM Security & Privacy

HMAC Merkle Tripwires SPEC

Cryptographically signed integrity tree. Attacker can't forge after compromise.

MethodHMAC-SHA256 per file, Merkle tree to root hash
Upgrade OverPlain SHA-256 (current) — adds secret key requirement
VerificationO(log N) per file, verify single file without full scan
Key StorageOff-device (USB or env var at boot). Never on disk.
RAM<1MB
Implementation~50 lines Python
DomainUM Security & Privacy

Real-time Filesystem Watcher SPEC

Instant detection via kernel inotify. Replaces polling.

Methodwatchdog library + inotify kernel events
Latency<100ms from file touch to alert
ReplacesCron-based tripwire checks
Limitation~8192 inotify watches (Linux default), can't cross mount boundaries
RAM~15MB resident
DomainDR Types & Structures
Counter-Attack

Counter-Attack Systems

Active defense. Waste attacker time, collect evidence, escalate response.

Response Engine LIVE

Escalating countermeasures triggered by cost verdicts

LevelsOBSERVE → ALERT → COUNTER → LOCKDOWN
OBSERVEcost <1K: log to disk
ALERTcost ≥1K: alert file + log
COUNTERcost ≥1M: evidence snapshot (processes, connections, logins, env)
LOCKDOWNcost ≥1T: full forensic dump + lockdown report
RAM<10MB
DomainKO Control & Orchestration

TCP Tarpit SPEC

Accepts connections, drips data at 1 byte/sec. Wastes attacker sockets.

Methodasyncio server, deliberate sleep per byte
CapacityThousands of trapped connections simultaneously
IntegrationEvery trapped connection → event bus → correlator
Trade-offExposes ports (increases surface by design)
RAM~5MB base + 100 bytes per connection
DomainAV I/O & Messaging

Labyrinth Filesystem SPEC

FUSE-based infinite fake directory tree. Logs every access.

Methodfusepy generates dirs on-the-fly with plausible names
PurposeBurns attacker time traversing nonexistent data
DetectionAny access = malicious (no legitimate users in the labyrinth)
RAM~10MB
Implementation~100 lines Python
DomainDR Types & Structures

Adaptive Rate Limiter SPEC

Token bucket + exponential backoff. Each failure makes the next harder.

MethodToken bucket per source IP, SQLite-backed state
Penaltydelay = min(base × 2^N, cap) per failed attempt
IntegrationFailed attempts increase depth in cost engine
Concept FromEnterprise WAF rate limiting, API gateway patterns
RAM<5MB + SQLite
DomainRU Policy & Constraints

Honeytoken Network SPEC

Fake credentials scattered across the system. Any use = confirmed compromise.

TypesFake AWS keys, API tokens, SSH keys, DB credentials, DNS canaries
Monitoringwatchdog inotify on token files + DNS listener for canary domains
Detection100% true positive rate, 0% false positive
Depth Modeld=5 (confirmed compromise)
Concept FromAttivo Networks, Thinkst Canary
DomainUM Security & Privacy

Forensic Collector SPEC

On-detection evidence snapshot with chain-of-custody hashing

Captures/proc trees, network state, file timelines, env vars, login history
IntegritySHA-256 hash of every collected artifact, append-only log (chattr +a)
MemoryOptional /proc/kcore dump, analyzed via Volatility 3
TriggerAutomatic at COUNTER and LOCKDOWN response levels
DomainCA Logic & Computation
Enterprise Architecture

Enterprise-Grade Concepts

Core logic extracted from enterprise systems. Lightweight Python implementations of billion-dollar ideas.

SIEM Correlator SPEC

Temporal event correlation with sliding-window state machines

MethodSigma-style rules: "5 failed logins in 60s from same IP → success"
Scoringcredibility × relevance × severity → maps to H(d,R)
Correlation depthChain length = depth d in cost function
Concept FromSplunk, Wazuh, IBM QRadar
DomainKO Control & Orchestration

XDR / EDR Engine SPEC

Process genealogy DAGs with per-node threat scoring

MethodDirected acyclic graph of process events, causality-linked
DetectionParent-child anomalies, API call sequences, memory allocation patterns
ScoringPer-node score + graph aggregate. DAG depth = attack depth.
Concept FromCrowdStrike Storylines, SentinelOne ActiveEDR
DomainRU Policy & Constraints

Zero Trust Scoring SPEC

Per-request trust evaluation with time-decay

Formulaaccess = trust_score ≥ resource_sensitivity
InputsIdentity confidence, device posture, network context, behavioral consistency
DecayTrust scores decay over time, forcing re-verification
Maps to H(d,R)Trust decay fits hyperbolic distance metrics naturally
Concept FromGoogle BeyondCorp, Zscaler ZPA
DomainRU Policy & Constraints

NDR Baseline SPEC

Per-device behavioral clustering, distance-from-centroid anomaly detection

MethodFeature vectors per entity, unsupervised clustering, deviation scoring
FeaturesPeers, protocols, data volumes, timing patterns, TLS fingerprints
DetectionDevice changes cluster → flag. Distance-from-normal = radius R.
Concept FromDarktrace, Zeek/Bro network analysis
DomainCA Logic & Computation

MITRE ATT&CK Mapper SPEC

Tags every detection with ATT&CK technique IDs, scores kill-chain completeness

MethodSTIX/TAXII JSON graph: indicators, malware, threat-actors, relationships
Tactics14 tactics, ~200 techniques mapped to detection rules
ScoringKill-chain completeness metric: more phases covered = higher depth
Concept FromMITRE ATT&CK Framework
DomainCA Logic & Computation

Deception Mesh SPEC

Breadcrumb trails + decoy services + honeynet for lateral movement detection

MethodFake assets planted on real endpoints pointing to decoy systems
BreadcrumbsFake SSH keys, RDP shortcuts, credential cache entries
DetectionAny interaction = confidence 1.0 (zero false positives)
Concept FromAttivo Networks, Illusive Networks
DomainUM Security & Privacy
Infrastructure Tools

Infrastructure Layer

Installable tools that feed the detection and response stack.

nmap SPEC

Port/service scanning for defensive auditing

Installapt install nmap
Usagenmap -sV -O localhost
Disk~25MB
RAM50-100MB per scan
Integrationpython-nmap wrapper feeds cost engine

tcpdump SPEC

Raw packet capture for offline analysis

Installapt install tcpdump
UsageCapture to PCAP, analyze with tshark
Disk~2MB + PCAP storage
RAM~10MB
IntegrationOn-demand capture during COUNTER/LOCKDOWN

Log Analyzer (logcheck) SPEC

Filters syslog for anomalous entries

Installapt install logcheck
MethodCron-based, regex filters, flags unusual log lines
Disk~2MB
RAMNegligible
IntegrationAnomalous log lines fed to correlator as events

Bandwidth Monitor (iftop/nethogs) SPEC

Real-time per-connection and per-process bandwidth

Installapt install iftop nethogs
iftopPer-connection bandwidth
nethogsPer-process bandwidth
Disk~1MB each
IntegrationBandwidth spikes feed baseline engine

SSH Honeypot (Cowrie) SPEC

Emulates SSH, logs brute-force attempts and attacker sessions

Installpip install cowrie
CapturesCredentials tried, commands run, files uploaded
RAM~50MB
IntegrationEvery login attempt → AttackVector → cost engine
DomainUM Security & Privacy

Resource Budget

Total system: 2.7GB RAM, 10GB disk. All systems must coexist.

System RAM Disk CPU Status
Cost Engine<5MB<1MBNegligibleLIVE
Port Watcher<5MBLog onlyBurst every 30sLIVE
Connection Tracker<5MBLog onlyBurst every 60sLIVE
Canary Tripwires<5MB~1MBBurst on checkLIVE
Response Engine<10MB~5MB/moBurst on triggerLIVE
Event Bus (SQLite)~5MB~30MB/moNegligibleSPEC
Filesystem Watcher~15MB0Idle (kernel events)SPEC
HMAC Merkle<1MB<1MBBurst on verifySPEC
Behavioral Baseline~20MB~10MB/moSampling every 10sSPEC
Entropy Analyzer<5MBLog onlyPer-packetSPEC
TCP Tarpit~5MBLog onlyAsync idleSPEC
Scapy IDS40-80MB~100MB/mo (PCAP)~10K pps maxSPEC
Cowrie Honeypot~50MB~20MBPer-sessionSPEC
TOTAL (all running)~155MB~170MB/moFits N4020

Attack Phase Coverage

Which systems detect which attack phases. Combined coverage approaches full spectrum.

System Recon Exploit Persist Exfil Lateral
Port Watcher++----
Connection Tracker+++-+++
Scapy IDS++++++++-+++++
Behavioral Baseline++++++++++++++
Canary Tripwires--++++-++
HMAC Merkle--+++++-+++
Honeytoken Network--+++++-++++
TCP Tarpit+++----
Entropy Analyzer-+-++++++
Process Genealogy-+++++++++
Cowrie Honeypot+++++++-++
COMBINED++++++++++++++++++++++++

The Law

H(d, R) = R(d²)

Every system on this page feeds through one formula. Depth compounds. Radius scales. The geometry prices attackers out.

Patent Pending — USPTO #63/961,403
SCBE-AETHERMOORE © 2024-2026 Issac Davis