Zum Inhalt springen
Prototyp pruefen

Threat Intelligence

This specification defines the threat intelligence subsystem: feed ingestion, signed update distribution, cloud enrichment statelessness guarantees, and attack surface analysis.

Audience: Backend/security engineers, threat intelligence analysts.


In-ScopeOut-of-Scope
Threat intelligence feed types and ingestionSpecific feed vendor names or contracts
Signed update distribution and rollback protectionML model training pipeline details
Cloud enrichment request/response modelDetection algorithm internals
Poisoning and feed compromise mitigationsEvent persistence and delivery

FeedContentUpdate FrequencyDelivery
Phone number reputationKnown fraud/scam numbers, campaign attributionContinuousCloud Enrichment API lookup
Domain/URL reputationKnown phishing, malware, C2 domainsContinuousCloud Enrichment API lookup
App signature databaseKnown malware signatures, suspicious app hashesContinuousCloud Enrichment API lookup
Threat signature packagesHeuristic rules, IOC patternsPeriodicSigned OTA packages to device
ML model updatesUpdated model weightsPeriodicSigned OTA packages to device

Documented product target: mixed internal/commercial/open-source feeds with frequent reputation refresh and signed package updates. Not confirmed by the current workspace code.


PropertyValueStatus
Signing algorithmEd25519Target only
Signature verificationOn-device, before loadingTarget only
Rollback protectionAgent rejects packages with version ≤ currentTarget only
TransportTLS 1.3 + certificate pinningTarget only
Package contentsModel weights + heuristic rules (no user data)Target only
Package size< 50 MB (model constraint)Documented
Integrity checkSHA-256 checksum embedded in signed manifestTarget only
ScenarioBehavior
New model performs worse (detected by validation)Automatic rollback to previous version. Validation set regression detected within 24h triggers rollback pipeline.
Signing key compromisedEmergency key rotation. Dual-signing during transition period (old + new key). Agents accept packages signed by either key for 30-day grace period.
Package corrupted during downloadRe-download from CDN. Agent continues with previous version.
Model file corrupted on diskAgent falls back to rule-based detection only. Triggers re-download.

PropertyValueStatus
Input typesSHA-256 hashes, anonymized feature vectorsTarget only
No device IDRequests not linkable to deviceTarget only
No user IDRequests not linkable to userTarget only
No sessionEach request independentTarget only
No IP loggingLoad balancer retains client IP for 7 days (security monitoring). No long-term IP storage.Target only
ResponseRisk assessment, campaign attribution, IOCsTarget only
{
"hash": "sha256:a1b2c3d4...",
"risk_level": "high",
"category": "phone_scam",
"campaign_id": "camp_eu_2026_03",
"first_seen": "2026-03-01T00:00:00Z",
"report_count": 1247,
"confidence": 0.92
}

Documented product target: enrichment response schema as shown above. The current workspace does not yet expose this as a stable runtime contract.


AttackDescriptionImpactMitigation
False positive injectionAttacker reports legitimate numbers/domains as maliciousLegitimate services blockedMulti-source validation. Minimum report threshold. Manual review for high-impact entries.
False negative suppressionAttacker floods reports for known-malicious entities as legitimateMalicious entities escape detectionReports weighted by source reputation. Verified feeds take precedence.
Feed compromiseExternal feed source compromisedCorrupted threat intelligenceMultiple independent feed sources. Cross-validation. Anomaly detection on feed updates.
AttackDescriptionImpactMitigation
Training data manipulationAdversarial examples in training dataModel learns incorrect classificationsInput validation pipeline, adversarial training with known attack patterns, anomaly detection on training data distribution shifts.
Model extractionReverse-engineering model via API queriesModel capabilities exposedRate limiting on enrichment API. No model internals exposed.
Model substitutionReplace signed model package on deviceArbitrary detection behaviorCryptographic signing + verification. Rollback protection.
AttackDescriptionImpactMitigation
MITM on updateIntercept and modify update packageMalicious model deployedTLS 1.3 + certificate pinning. Package signature verification.
Replay attackRe-deliver old (vulnerable) modelAgent downgrades to weaker detectionRollback protection: agent rejects version ≤ current.
CDN compromiseDistribution infrastructure compromisedMalicious packages servedPackage signing independent of CDN. Verification on device.

MetricTargetStatus
Phone number reputation freshness< 1 hourTarget only
Domain reputation freshness< 1 hourTarget only
Model update latency< 24 hours (scheduled), < 4 hours (critical)Target only
Threat signature update frequencyDaily (scheduled), on-demand (critical)Target only
Cloud enrichment availability99.9%Target only
Cloud enrichment latency (P95)< 200 msTarget only

FailureImpactMitigation
All feeds unavailableNo new threat intelligenceDevice continues with cached data. Last-known-good signatures.
Cloud Enrichment API downNo reputation lookupsLocal detection continues. Ambiguous signals default to Warn.
Signing key rotationDevices temporarily reject new packagesGraceful key rotation: dual-sign during transition period.
Feed data quality degradationIncreased false positives/negativesAnomaly detection on feed updates. Automatic rollback on quality metrics.