The same topological identity engine that powers robotics, markets, healthcare, and defense —
applied to network traffic. Flows, endpoints, DNS. Local silicon. Zero-day detection at O(1). Deterministic.
Advisory signal, not autonomous remediation.
CYBER PIPELINE
The Detection Path
From raw packet capture to threat-classification signal in a single deterministic pass. Every output carries a full forensic chain.
01 — Capture
Packet → Ingest
NetFlow records, PCAP streams, or endpoint telemetry ingested via CyberDataView. Protocol validation enforced per source type.
0.3ms
→
02 — Extract
Signal Adapter
NetFlow → traffic topology. DNS → query graph. Endpoint → process tree. TLS → certificate fingerprint. Source-specific feature extraction.
python proof-artifacts/benchmarks/run_cyber_proof.py — same output every run
"The cyber engine detects structural anomalies in network topology and converts them into forensic-grade classification signals for SOC analysts — advisory, not autonomous remediation."
THE CYBER ENGINE THESIS
DATA FLOW
A Different Kind of Threat Detection
Most cybersecurity tools are signature-based scanners or cloud-dependent ML classifiers. This engine is structural, deterministic, and edge-native.
SIGNATURE-BASED IDS
Pattern Match → Alert
Matches packets against a static rule database. Misses zero-day attacks entirely. Requires constant signature updates. No structural understanding of traffic.
CLOUD SIEM / XDR
Log → Cloud → Dashboard
High accuracy after hours of correlation, but cloud-dependent with minutes of latency. Attackers complete lateral movement before alert fires.
ML-BASED NDR
Train → Baseline → Anomaly
Better detection but high false-positive rates, retraining cycles, and black-box explanations. Analysts suffer alert fatigue.
APEX17 CYBER
Capture → Topology → Council → Classify
Real-time structural analysis with full forensic trail. Runs on local silicon — no cloud required. Fingerprint recall identifies known threats at O(1). Novel patterns flagged instantly by fingerprint miss. Every output is a forensic-grade signal, not a black-box prediction.
DIFFERENTIATORS
Five Architecture-Level Differences
Structural design choices that matter for enterprise and government cybersecurity.
01
Zero-Day Detection Without Signatures
The engine doesn't need a signature for every attack. H₀ topology detects structural anomalies that no rule database has seen. A fingerprint miss is the detection.
Standard IDS fails on zero-days because it only recognizes what it's been taught. This engine recognizes what it hasn't seen — and flags it automatically.
02
Traffic Fingerprint at O(1)
Every traffic pattern produces a 64-bit persistence fingerprint. Known attack patterns are recalled instantly via hash lookup — no database scan required.
"Have I seen this C2 beacon before?" is answered in constant time. Same hash = same campaign. Different hash = novel variant. Instant triage.
03
Multi-Source SOC Council
NetFlowAgent, EndpointAgent, and DNSAgent fuse at the edge. Modality-gated: only relevant sources vote. Correlated evidence from multiple sources eliminates false positives.
A DNS anomaly + unusual NetFlow pattern + endpoint process anomaly produces much higher confidence than any single source — and the forensic trail shows exactly why.
04
NIST-Auditable Forensic Chain
Every classification carries: traffic fingerprint → council votes → reasoning strings → threat level → confidence score. All timestamped, all deterministic.
Critical for SOC2, NIST 800-53, and CMMC compliance. The system proves exactly why it classified traffic at a specific threat level for a specific time window.
05
Air-Gapped / Edge-Native
Runs entirely on local silicon. No cloud dependency. Operates inside air-gapped networks, classified environments, and OT/SCADA segments where cloud is forbidden.
Air-gapped networks can't use cloud security. This engine processes network telemetry at the edge with zero connectivity — critical for DoD, nuclear, and critical infrastructure.
STATE OF THE ART
SOTA Comparison: Traditional vs. Topological
Benchmarked against current-generation cybersecurity tools across detection speed, zero-day capability, and forensic quality.
The cybersecurity market is massive but fragmented. No current player combines topological detection, edge-native processing, and deterministic forensic chains.
ENDPOINT LEADER
CrowdStrike — Falcon
Dominant EDR/XDR platform. Cloud-native with excellent detection, but requires cloud connectivity and uses ML models that can't explain their reasoning. $90B market cap built on endpoint telemetry.
Cloud-dependent · ML black box
NETWORK SECURITY
Palo Alto Networks — Cortex
Full SASE/XDR stack. Platform approach with massive enterprise footprint, but detection relies on signature + ML hybrid. Minutes-to-hours detection cycle for novel threats.
~Minutes for novel · signature-dependent
AI-NATIVE NDR
Darktrace — Antigena
Closest to "autonomous detection." Uses unsupervised ML for anomaly detection, but black-box explanations cause alert fatigue. Autonomous response is controversial in enterprise SOCs.
~Seconds for anomaly · no forensic chain
TOPOLOGICAL EDGE
Apex17 Cyber — This Pipeline
2.5ms deterministic detection with full forensic chain. Zero-day via fingerprint topology. No cloud. No training. Multi-source council eliminates false positives. NIST-auditable by design.
2.5ms edge · zero-day · forensic chain
MARKET VALUE
The Largest TAM of Any Domain
Cybersecurity is a $200B+ market growing 12% annually. Every enterprise, government, and critical infrastructure operator is a buyer. Dual-use: commercial + defense.
$200B+
Global Cybersecurity
Total addressable market. Growing 12% YoY. Every enterprise is a buyer.
$8B
NDR Market (2028)
Network Detection & Response. Growing from $3.2B in 2024. Fastest growth segment.
$32B
Zero-Trust Architecture
Edge-native, air-gapped, and deterministic — three pillars of zero-trust.
HONEST ASSESSMENT
What This Proves. What Production Needs.
This scaffold demonstrates the architecture works on network telemetry. Production cybersecurity requires significantly more.
What This Scaffold Proves
Same topology math works on network traffic data
Five domains — one engine, one math, zero retraining
O(1) threat recall via fingerprint hash
SOC council fuses NetFlow + Endpoint + DNS at edge
Forensic trail — every classification traceable to packets
The topological identity engine is domain-agnostic. H₀ persistent homology works on any structured data — spatial, temporal, clinical, tactical, or network.
Robotics
LiDAR → persistence → Director Governor veto. O(1) SceneMemory.