Malaphor
Malaphor GNN log analyzer and centralizer
The problem Malaphor solves
AI-Enhanced Threat Hunting in Cloud Environments
Build an AI tool to monitor and analyze cloud access logs and configurations, detecting anomalous behaviors indicative of compromise or misconfiguration.
Feasibility: Use publicly available cloud security logs (or simulated datasets)
Challenges we ran into
Malaphor offers a smarter approach to finding threats in your cloud environment. It gathers necessary information like configurations, access logs, network flows, and security alerts.
This gathered data is used to build a detailed map of all the cloud components, servers, storage, databases, user accounts, and crucially, how they're all interconnected through permissions and network settings.
then it studies this map to learn what normal interactions look like across your specific setup. Instead of getting lost in endless individual logs, it focuses on spotting suspicious activities or risky setups by analyzing the relationships shown on the map. This means it can detect complex threats like unusual access sequences between services, accounts with hidden pathways to gain excessive privileges, or combinations of small configuration changes that together create significant vulnerabilities.
By understanding the context of how everything is connected, it pinpoints sophisticated threats and risky misconfigurations more effectively than traditional tools.
The insights and alerts are delivered through a user-friendly web dashboard, accessible via a SaaS platform. For organizations preferring to keep data entirely within their boundary, it can also be provided as a deployable software package (e.g., containerized) to run within your own cloud environment.
