TrustShield, a certificate intelligence vendor, scans public TLS certificates and internal enterprise PKI logs to detect suspicious certificate issuance. The security team wants a binary classifier that flags potentially malicious or misissued certificates for analyst review before they are trusted by downstream systems.
The training data combines Certificate Transparency logs, enterprise CA issuance records, and analyst labels from prior investigations.
| Feature Group | Count | Examples |
|---|---|---|
| Certificate metadata | 14 | validity_days, key_size, signature_algorithm, is_ca, path_length |
| Subject / issuer fields | 11 | subject_country, issuer_org, wildcard_count, san_count |
| Behavioral / historical | 9 | issuer_cert_volume_7d, domain_age_days, prior_revocations, reuse_of_subject |
| Trust / policy signals | 8 | has_ev_policy, ocsp_enabled, crl_present, self_signed |
| Temporal features | 6 | issuance_hour, day_of_week, days_to_expiry_at_scan |
A solution is considered good enough if it achieves PR-AUC >= 0.55, recall >= 0.80 at precision >= 0.35, and produces feature-level explanations usable by security analysts.