Introducing Intrusion Core
WHAT’S THE BIG IDEA?
It is nearly 2020 and we have been plagued by cyber attacks throughout the decade. From ransomware to zero day exploits, it seems like the infections never cease to end and the industry is unable to catch up. Different tools provide different countermeasures, but many are not comprehensive enough to defend in depth with layers of protection and evolving to counter new threat vectors. In addition to the lack of available tools, many are too expensive or too complicated for small businesses to use. This leaves a gap that unfairly challenges small business owners and organizations who need simplicity due to financial constraints. Perhaps the most disturbing issue is that many users struggle to adapt to security solutions, rather than the solution being designed to adapt to the user, and when this happens they start to resent what is ultimately protecting them. With the level of attacks occurring everyday and even becoming automated, it is time that a new solution is developed! That solution is Intrusion Core!
Healthcare Industry Providers
Seconds between victims of hacking on average.
Lacking Incident Response Plans
Targeted by Hackers
To develop a collaborative but decentralized intrusion prevention and management system that evolves through AI-leaning, baselining, and gamification. The central idea of Intrusion Core is to keep the implementation simple and the interface clean. This means no “terminal-only” or “command-based” for basic usage, that stuff is for the techies out there. Additionally, to prevent zero-day exploits, the code needs no fluff and will be open-source.
- Users hate redundant security tasks such as setting strong passwords or waiting for antivirus scans.
- AI learning drastically improves the security posture so long as there are enough nodes providing relevant logs.
- Gamification can assist users in learning security concepts, performing redundant tasks, & providing information to AI
- Most zero-day exploits, while detected, are not patched quickly enough or thoroughly enough by organizations.
- Targets of Advanced Persistent Threats require individual-based AI learning to prevent impersonation, phishing, unauthorized access, & spillage.
- A simple & clean philosophy assist inexperienced technicians with becoming comfortable with the tools.
- Simplicity in usage, complex in protection, & clean in code seems impossible which is why it must be attempted.
Founding of Security in Check
Relaunch of Security in Check & Introduction of Intrusion Core
Planned Development of Intrusion Core (open-source) & Releasal of Abyssal Wolf
First Release for Testing
Will Happen Eventually
It takes more than just an antivirus program or firewall to keep your security in check. Instead, most companies have moved toward using Unified Threat Management (UTM) systems. Many of which are complicated, do not address vulnerabilities, and do not provide the user with understandable explanations. This means only the most adept technicians can use the tool and leaves little room for small-businesses to be protected. Perhaps, the end-user does not know what they need to protect or how to do it! They may need to patch vulnerabilities, implement identity access management (IAM) solutions, create secure & encrypted backups, or any other possible security issue. Most people do not have this knowledge and do not have the monetary capabilities to purchase existing services.
In conclusion, the idea of this project is to defend against zero-day exploits through means of a unified threat management model that is backed by AI, gamified learning, simplicity at its core, and open-source with the option to collaborate (or remain decentralized). The goal is to have a working production in the next couple years (refer to the timeline) as I test out different models. It is very important to me that this remain simple & clean for end-users, while providing increased functions for more technical users should they wish. Lastly, I want it to be designed as such that developers can create “mods” very easily. This is in order to keep the project evolving & keep everyone’s security in check.
This is a work-in-progress and I can only develop when I have time. If you thought this was interesting feel free to let me know, but I am not obligated to give you anything. Also, once this is made open-source anyone can use/manage/develop it. I will start posting updates to www.intrusioncore.com once I get the website up!