Logo Object Oriented Cybersecurity Detection Architecture (OOCDA) Suite
Executive Summary Start Author Project Map

Executive Summary
Our (OOCD) Suite Copyright Presentation:
Presenting our Cloud Object Oriented Cybersecurity Detection (OOCD) Suite architect to United States Copyright Office is different than presenting any architecture-design to a client. We normally would be engaged with clients specs and requirement and working with the clients team. There would exist a number of protocols and channels of communication.

We built a HTML website folder with Java code subfolder. "index.html" page is the start the (OOCD) Suite pages. The index page has our Cloud Tiers - 2,000 ft view of the system components image plus bolt-point links to each component page. Sadly navigating back, users must use "go back Arrow" to get to the Start, our click on the "Start" link located in every page heading. Project Map page is a list of the page listed in alphabetical order.

OOCD Suite Architecture is an End-2-End architecture with partial-detailed design and Java code. OOCD Suite Architecture is multitier cloud system with intelligent and virtual components which we had architected-designed to secure End-2-End any cloud system from internal and external hacking attacks. Security is implemented independently by each tier. OOCD Suite is scalable, integrate-able to any cloud system. The goal is to build a cloud Umbrella for big enterprise systems with room for Vertical and Horizontal scaling. OOCD Suite Architecture is a cost effective homegrown system with or without any vendors support or outsourcing.

What is different about our architect-design and what are we trying to protect?
Our Approach, architect-design and structure is different from what we see exists in the market. Every Component and Container presents a new and unique architect-design-approach. For example, virtualization existed before the internet even started where virtual storage memory using disk space was used to add more virtual memory. Our Single Virtual Container with one component (with its supportive applications) created by virtual intelligent automated DevOps support and protected by Machine Learning tools and applications. Where we are using components testing matrices to automate and add intelligence to detection which in turn adds intelligence to Machine Learning support is a new and unique.

Our DevOps Editors is our new intelligent automation to be used by every independent department, groups, divisions, clients, or anyone who would want to start his/her won running virtual cloud system with all the bells and whistles.

As for our Machine Learning architect-design is not a guessing game of trying different algorithms, but it is using Zeros and Ones of the target search object to build words, from these words would build patterns. These patterns are scaled and added to our intelligent analysis and search engines. For example, every hackers' code (executable statements) would be broken into Zeros and Ones. The Zeros and Ones are executable statements, operating system calls, script calls, batch calls, ..etc. These Zeros and Ones are used to build hacking words. The hacking word are used build hacking patterns. The hacking patterns are used to scan and search for any code with bad intentions. See Code Analysis Example in Malware Detection Template Analysis page (MalwareDetectionTemplatePage.html). Our Machine Learning Zeros and Ones engines would be automatically adding more new patterns without human supervisions.

We would be more than happy to demo and answer questions.