Threat Correlation & Attack Chains

Cross-module correlation · Timeline · Incidents

Overview

Individual alerts are useful, but correlation is what turns alerts into incidents. The 1SEC correlator links signals across modules into a single attack narrative.

Authoritative details live in Docs.

Signals

  • Shared source IP across multiple categories
  • Temporal proximity windows
  • Known sequences (auth → network → runtime)

Attack Chains

Chains model common multi-step intrusions (initial access, persistence, lateral movement, exfiltration). Correlated outputs include contributing alert IDs and summarized recommendations.

Outputs

Correlation emits enriched threats and can trigger higher-severity escalation paths.

Operations

API
GET /api/v1/correlator
GET /api/v1/threats