ShieldNet operates endpoint and network monitoring for 8,000 enterprise customers and ingests millions of security events per day. The SOC wants an anomaly detection model that flags suspicious authentication and network activity early enough for analysts to investigate before a broader compromise occurs.
You are given 90 days of event-level security telemetry aggregated into 5-minute entity windows (user-device or sourceIP-destinationIP pairs). The goal is to score each window as anomalous or normal.
| Feature Group | Count | Examples |
|---|---|---|
| Authentication activity | 10 | login_count, failed_login_rate, distinct_hosts, geo_velocity |
| Network behavior | 12 | bytes_sent, bytes_received, dest_port_entropy, external_ip_ratio |
| Process / endpoint signals | 8 | process_spawn_count, unsigned_binary_rate, admin_action_count |
| Temporal context | 6 | hour_of_day, day_of_week, holiday_flag, time_since_last_seen |
| Entity profile features | 6 | user_role, device_type, business_unit, historical_avg_volume |
A good solution should detect at least 70% of confirmed malicious windows while keeping precision high enough that analysts review no more than 300 alerts per day. The model should also provide enough signal to support triage and threshold tuning.