ForensIQ Logo
ForensIQ
DSCI Cyber Innovation Challenge · Team editedit · ABV-IIITM Gwalior

Cyber Forensics.
Legally Defensible.

ForensIQ is the first end-to-end log investigation framework that delivers AI-speed analysis without sacrificing cryptographic evidence integrity. Built for the courtroom, not just the SOC.

[SYSTEM] Merkle block sealed · SHA-256 verified · RSA-4096 signed · RFC-3161 ✓

Designed for critical infrastructure

BFSIDefenseHealthcareTelecomGovTechEnterprise
scroll
The Scale of the Problem

Modern breaches generate millions of logs.
Traditional tools weren't built for this.

0
Logs / day
in a typical enterprise deployment
0.0%
Integrity verification rate
cryptographically proven
0
Evidence blocks sealed
across demo environment
0%
AI hypothesis confidence
on critical severity findings

Without ForensIQ

  • Log tampering silently erases attack evidence
  • Timestamp manipulation hides the real attack timeline
  • Black-box AI creates legal liability in court
  • SIEMs contaminate evidence during re-indexing
  • Manual triage delays breach response by hours
  • Cloud logs evaporate before forensics even begins

ForensIQ's guarantees

  • Merkle-chained immutable evidence blocks
  • Overlapping integrity windows detect time-stomping
  • Explainable neuro-symbolic reasoning engine
  • Cryptographically isolated dual-pipeline
  • Pre-ranked AI hypotheses cut triage to minutes
  • Streaming forensic sealing at ingestion time
Core Capabilities

Built different. Proven in court.

Every feature exists for a reason: to ensure your forensic investigation is faster, smarter, and legally unassailable.

Dual-Pipeline Architecture

Hot Path for real-time AI analysis. Cold Path for cryptographic evidence sealing. Both run simultaneously — neither ever compromises the other.

Merkle Chain Integrity

Every log block is SHA-256 hashed, RSA-4096 signed, and chained. Tampering is mathematically impossible to conceal — down to the millisecond.

Neuro-Symbolic AI

Streaming anomaly detection fused with deterministic rule logic. Every hypothesis is explainable, traceable, and mapped to MITRE ATT&CK.

Trust-Aware Ingestion

Kernel logs are not equal to IoT telemetry. ForensIQ classifies every source at ingestion — weighting evidence by its reliability tier automatically.

Anti-Time-Stomping

Overlapping temporal windows cross-validate timestamps across all sources. Clock manipulation is flagged as forensic evidence, not dismissed as noise.

Court-Ready Dossiers

Export fully auditable forensic reports with chain-of-custody tables, signed evidence IDs, and human-verified reasoning for legal proceedings.

Six-Phase Pipeline

From raw log to signed evidence.

Every phase maps to a specific forensic objective. Nothing is implicit.

P-01

Trust-Aware Acquisition

Agents collect from any source — cloud, on-prem, IoT — and tag each log with a trust tier at the point of ingestion.

P-02

Dual-Path Bifurcation

Traffic splits at the Logstash gateway. Hot Path feeds real-time intelligence. Cold Path feeds cryptographic sealing. Never the reverse.

P-03

Forensic Integrity Sealing

Raw logs are grouped, SHA-256 hashed into Merkle blocks, RSA-4096 signed, and timestamped via RFC 3161. Immutable by design.

P-04

Real-Time Intelligence Indexing

The operational stream is normalized to OCSF and indexed into Elasticsearch for sub-second search and vector lookups.

P-05

Neuro-Symbolic Hypothesis Generation

River ML streaming anomaly detection fuses with YAML-rule symbolic logic under the Fusion Policy Layer to generate ranked, explainable findings.

P-06

Investigator Reasoning & Provenance

Analysts query findings in plain English via RAG-LLM. Every answer links to a verified log ID. All decisions are immutably logged.

Comparison

No other tool closes all four gaps.

Existing solutions force a trade-off between operational speed and forensic integrity. ForensIQ is the only platform that refuses to make that compromise.

ToolEvidence IntegrityStreaming AnalysisExplainable AICourt Ready
Splunk SIEM
EnCase Forensics
Prophet Security
AWS CloudTrail
ForensIQ our solution
Target Sectors

Built for India's critical infrastructure.

BFSI
Fraud investigation & insider misuse
Defense
Air-gapped, sovereign deployment
Healthcare
Patient data breach investigation
Telecom
Signalling abuse attribution
GovTech
Multi-cloud forensic readiness
Enterprise
SOC-to-courtroom capability

Your next breach investigation
deserves better.

Stop losing cases because your evidence pipeline wasn't built for court. ForensIQ is free, on-premise, and legally defensible from day one.

ForensIQ Team editedit · ABV-IIITM Gwalior · DSCI Cyber Innovation Challenge v1.0 ISO 27037 · NIST SP 800-92 · RFC 3161