Detection

Detection Modes

Detection sensitivity and action mode configuration

VaultDEC operates with two independent mode settings: a Detection Mode that controls sensitivity, and an Action Mode that controls response behavior.

Detection Modes

STANDARD

The default mode. Balanced between security and tolerance for normal traffic variation.

  • Requires more rules to trigger before action
  • Longer measurement windows for sustained behavior analysis
  • Best for environments with variable but predictable traffic patterns
  • Recommended for initial deployment and baseline establishment

Use when: You're first deploying VaultDEC and want to establish what "normal" looks like before tightening restrictions.

STRICT

Elevated sensitivity with tighter thresholds.

  • Fewer rules need to agree before action
  • Shorter measurement windows catch anomalies faster
  • More aggressive large-packet analysis
  • May generate occasional false positives during unusual but legitimate activity

Use when: You've established a baseline in STANDARD mode and want stronger protection. Your traffic patterns are well-understood and predictable.

VAULT

Maximum security. Zero tolerance for anomalous upload behavior.

  • Minimal rules required to trigger
  • Shortest measurement windows
  • Any significant deviation from baseline triggers response
  • Accepts higher false positive rate in exchange for near-instant detection

Use when: The data being protected is critically valuable and a brief connection interruption is an acceptable trade-off for maximum security. Appropriate for environments where the protected server has no legitimate reason to upload significant data.

Action Modes

Action modes determine what VaultDEC does when the detection threshold is reached.

TEST

For initial setup and verification.

  • Rules evaluate normally
  • No alerts generated
  • No connection kills
  • All metrics logged
  • Dashboard shows what would trigger

Use when: First connecting VaultDEC to understand your traffic patterns.

AUDIT

Detection without enforcement.

  • Rules evaluate normally
  • Alerts are generated and logged
  • Heartbeat reflects alert status
  • No connection kills
  • Full logging of all triggered events

Use when: You want to verify that VaultDEC would catch real threats without risking disruption to legitimate traffic. Recommended for at least 48 hours before switching to LIVE.

LIVE

Full enforcement mode.

  • Rules evaluate normally
  • Alerts are generated and logged
  • Heartbeat reflects status in real time
  • Connection is killed when threshold is reached
  • Bridge interfaces are brought down, severing the protected server from the network

Use when: You've validated behavior in AUDIT mode and are confident in your threshold settings.

Mode Combinations

Detection × ActionBehavior
STANDARD + TESTLoose evaluation, no response. Learning mode.
STANDARD + AUDITLoose evaluation, alerts only. Initial monitoring.
STANDARD + LIVELoose evaluation, real kills. Production default.
STRICT + AUDITTight evaluation, alerts only. Pre-production validation.
STRICT + LIVETight evaluation, real kills. Enhanced production.
VAULT + AUDITMaximum sensitivity, alerts only. Final validation before lockdown.
VAULT + LIVEMaximum sensitivity, real kills. Maximum security.
  1. Day 1-3: STANDARD + TEST — Establish baseline, observe traffic patterns
  2. Day 4-7: STANDARD + AUDIT — Verify detection accuracy against known-good traffic
  3. Week 2: STANDARD + LIVE — Enable enforcement with balanced sensitivity
  4. Week 3+: STRICT + LIVE — Tighten if baseline is stable and predictable
  5. Optional: VAULT + LIVE — For maximum security environments only

Changing Modes

Modes can be changed via the ephemeral dashboard or through the management API:

# Enable dashboard first
ssh vaultdec@<mgmt-ip> enable-dashboard 15m

# Then use the web UI to change modes
# Or use the API directly:
curl -X POST http://<mgmt-ip>:8080/api/config \
  -H "Content-Type: application/json" \
  -d '{"detection_mode": "STRICT", "action_mode": "LIVE"}'

Mode changes take effect immediately. No restart required.

On this page