RADAR is a key part of the SOAR mission of IDPS-ESCAPE, providing anomaly detection scenarios with automated responses. This folder stores all design, development, and implementation artifacts for deploying AD scenarios with dedicated active responses (AR).
Our security orchestration approach provides Risk-aware AD-based AR (RADAR) modules aimed at enhancing SOC operations. RADAR modules integrate with the OpenSearch AD plugin using Amazon’s Random Cut Forest (RCF) algorithm. We recommend a hybrid approach combining SONAR/ADBox with RRCF-based RADAR for resilience to adversarial interference.
We leverage OpenSearch’s latest advances, including false positive reductions and support for high-cardinality anomaly detection via slicing, enabling per-user or per-device baseline detectors.
📚 For comprehensive documentation: See docs/manual/radar_docs/ for learning paths, troubleshooting guides, integration documentation, and architecture deep dives.
| Document | Description |
|---|---|
| RADAR Architecture | System architecture, design principles, component diagrams, data flows |
| Getting Started | Prerequisites, setup instructions, deployment modes, configuration |
| Ansible Playbook | Detailed breakdown of the Wazuh manager automation pipeline |
| Run RADAR (AD Workflow) | Detector and monitor creation workflow via run-radar.sh |
| Detection Rules | Wazuh rule definitions for each scenario |
| Scenarios overview and configuration | Detailed documentation of the scenarios folder artifacts |
| Webhook | Webhook service deployment and configuration |
| Active Response | Active Response logic flow |
Currently, anomaly detection coupled with automated response is implemented for the RADAR scenarios listed below. Each scenario integrates a detector, monitor, webhook, decoder, rule, and active response in a deployable solution. They also come with a dataset ingestor (wazuh_ingest.py) aimed at populating the Wazuh indexer.
| Scenario | Status | Data Source | Detection Type | Documentation |
|---|---|---|---|---|
| GeoIP Detection | ✅ Production | Real Wazuh | Signature | Guide |
| Log Volume Monitoring | ✅ Production | Real Wazuh | RRCF-based | Guide |
| Suspicious Login (Signature) | ✅ Production | Real Wazuh | Signature | Guide |
| Insider Threat | 🧪 Demo | Synthetic | RRCF-based | README |
| Suspicious Login (Behavior) | 🧪 Demo | Synthetic | RRCF-based | Guide |
| DDoS Detection | 🧪 Demo | Synthetic | RRCF-based | README |
| C2 Malware Communication | 🧪 Demo | Synthetic | RRCF-based | README |
Important: Demo scenarios are not production-ready. Deployment requires adaptation of indices/aliases, field mappings, time/category fields, decoders/ingest pipelines, TLS/hostnames, and detector/monitor parameters to align with your organization’s log schema and infrastructure.
Here we provide a screenshot of a successful run of the Geo IP detection RADAR scenario:

The currently implemented active response sends an email to a designated recipient.

Additionally, if FlowIntel is configured the active response creates a case in FlowIntel on high risk alerts.

The RADAR subsystem comes with a dedicated test framework aimed at automating the experimentation and validation chain of activities. More precisely, powered by Ansible, we provide a pipeline automating the ingestion of datasets, preprocessing, training and ML model baseline establishment, attack simulation, data collection, followed by post-processing and computation of statistical measures, which are then reported to the user.
See RADAR test framework for more details.
The active response modules stored in the respective RADAR scenario implementation folders, i.e., radar/<RADAR-scenario>/active_responses, provide
automated responses and contextual enrichments based on anomalies.
These reduce manual work for analysts via automation and also benefit from our CTI integration support, e.g., insider threat active responses.
Adversarial machine learning poses significant challenges to anomaly detection systems. Attackers may attempt to poison training data, evade detection, or manipulate models. We recommend a hybrid approach combining signature-based detection, multivariate AD (SONAR/ADBox), and classical streaming AD (RRCF) for defense in depth.
Key defensive strategies include:
For comprehensive guidance on implementing these defensive mechanisms, see our dedicated adversarial ML best practices guide.