Home QuickSecure Docs Architecture

Architecture Overview

Three-layer autonomous containment: endpoint agent, ML governance cloud, and enterprise tenant isolation

System Overview

QuickSecure is built on a three-layer architecture: endpoint agent (user-mode only), ML governance cloud (model registry, drift monitoring, safe deployment), and enterprise tenant isolation (hybrid model registry, per-tenant metrics).

Endpoint Agent

User-mode monitoring, on-device ML inference, multi-stage detection, confidence-gated containment

ML Governance Cloud

Versioned model registry, drift monitoring, safe deployment with rollback, fleet-wide learning

Tenant Isolation

Per-tenant data boundaries, dedicated model support, isolated metrics and governance

Architecture details: Detailed diagrams, component interactions, and internal data flows are available under NDA as part of our enterprise evaluation program. Request access →

ETW Monitoring (Windows)

QuickSecure uses Event Tracing for Windows (ETW) for real-time system monitoring without kernel drivers.

Why ETW Instead of Kernel Drivers?

AspectKernel DriverETW (QuickSecure)
System StabilityBSOD risk on crashProcess-level isolation
InstallationRequires rebootNo reboot needed
UpdatesComplex, riskyHot update possible
CPU OverheadVariable< 0.1%
Attack SurfaceKernel-level exploit targetUser-mode containment
Explainable Detection: Every ETW event includes full context: process path, command line, parent process, user context, and timestamp. Events are tagged with MITRE ATT&CK IDs.

Local AI Engine

The local AI engine runs entirely on your device, providing instant threat detection without network latency.

Model Specifications

  • Format: Industry-standard ONNX, cryptographically signed
  • Size: Optimized for edge deployment (~5MB)
  • Inference Time: <15ms per sample
  • Memory: ~20MB working set

Static Analysis

  • PE header anomalies
  • Section entropy scoring
  • Import table analysis

Behavioral Analysis

  • Process tree patterns
  • API call sequences
  • File system behavior

ML Classification

  • Neural network scoring
  • Feature embedding
  • Composite risk score

Inference Fallback Chain

Three-stage resilient inference pipeline. If the primary model fails or confidence is insufficient, fallback stages engage automatically.

Stage 1

ONNX Edge Model

Primary neural network inference. If confidence ≥ policy threshold, decision is final.

Stage 2

Random Forest

Secondary ensemble classifier. Activated when ONNX returns low confidence or fails to load.

Stage 3

Rule-Based Heuristics

Deterministic rules for known threat patterns. Always available, zero ML dependency.

Every decision records which fallback stage was used. This is visible in the SOC console and audit trail.

Autonomous Decision Engine (Auto-Pilot)

The Auto-Pilot system supports three progressive trust modes: Shadow, Supervised, and Full Autonomous.

Auto-Approval Criteria (Full Autonomous)

In Full Autonomous mode, the system applies multiple validation gates before auto-approving a containment action. These include AI confidence scoring, risk assessment, global prevalence checks, and false-positive history verification. Exact threshold values are configurable per deployment and documented in the enterprise deployment guide.

Grey-Zone Handling

Detections in the grey zone (below the auto-approval threshold but above baseline) are routed to multi-factor analysis including global prevalence, severity scoring, known-threat database matching, and MITRE ATT&CK correlation.

Recommendation: Start with Shadow mode to establish a baseline. Promote to Supervised for human-in-the-loop labeling, then Full Autonomous once drift is stable and FP rate is below threshold.

Collective Defense Network

When a threat is confirmed on one endpoint, all QuickSecure endpoints worldwide receive the IoC within seconds via Protobuf delta sync.

Propagation Timeline

0ms

Threat Detected

Endpoint A detects and quarantines suspicious file

50ms

Report Sent

Threat telemetry with feature vector uploaded to Corxor cloud

200ms

Analysis Complete

AI Judge confirms threat. TP/FP label generated. IoC created.

<1s

Global Protection

All endpoints receive the IoC via delta sync. Hash is blocked fleet-wide.