Architecture
High-Level Overview
RhythmX extends the LogRhythm platform with a complementary detection and analytics layer. It receives logs from LogRhythm's Log Distribution Services, processes them through dedicated ingestion pipelines, applies Sigma-based behavioral detections, runs machine learning anomaly detection, and correlates alerts across 21 threat use cases — all feeding back into LogRhythm for unified alerting and case management.
flowchart TD
subgraph sources [" "]
direction LR
W["Windows Endpoints<br><i>Event Logs</i>"]
LS["Linux Endpoints<br><i>Sysmon</i>"]
LA["Linux Endpoints<br><i>Auditd</i>"]
end
SMA["System Monitor Agents"]
MED["Mediator"]
LDS["Log Distribution Services"]
WP["Windows Pipeline<br><b>Port 5514</b> · TCP/UDP"]
LSP["Linux Sysmon Pipeline<br><b>Port 5515</b> · TCP"]
LAP["Linux Auditd Pipeline<br><b>Port 5516</b> · TCP"]
EN["Log Enrichment &<br>Normalization"]
ROT["Log Rotation &<br>Batching"]
DET["Sigma Detection Engine"]
subgraph analytics [" "]
direction LR
ML["ML Anomaly Detection"]
CORR["Correlation Engine<br><i>21 Threat Use Cases</i>"]
end
OUT["Structured Detection Output<br><i>LogRhythm-compatible</i>"]
W --> SMA
LS --> SMA
LA --> SMA
SMA --> MED
MED --> LDS
LDS -->|"Port 5514"| WP
LDS -->|"Port 5515"| LSP
LDS -->|"Port 5516"| LAP
WP --> EN
LSP --> EN
LAP --> EN
EN --> ROT
ROT --> DET
DET --> ML
DET --> CORR
ML --> OUT
CORR --> OUT
style sources fill:#4a148c,stroke:#7c43bd,color:#fff
style analytics fill:#1a237e,stroke:#534bae,color:#fff
style SMA fill:#1a237e,stroke:#534bae,color:#fff
style MED fill:#1a237e,stroke:#534bae,color:#fff
style LDS fill:#1a237e,stroke:#534bae,color:#fff
style W fill:#6a1b9a,stroke:#ab47bc,color:#fff
style LS fill:#6a1b9a,stroke:#ab47bc,color:#fff
style LA fill:#6a1b9a,stroke:#ab47bc,color:#fff
style WP fill:#4a148c,stroke:#9c27b0,color:#fff
style LSP fill:#4a148c,stroke:#9c27b0,color:#fff
style LAP fill:#4a148c,stroke:#9c27b0,color:#fff
style EN fill:#0d47a1,stroke:#42a5f5,color:#fff
style ROT fill:#e65100,stroke:#ff9d3f,color:#fff
style DET fill:#b71c1c,stroke:#f05545,color:#fff
style ML fill:#00695c,stroke:#4db6ac,color:#fff
style CORR fill:#00695c,stroke:#4db6ac,color:#fff
style OUT fill:#1b5e20,stroke:#4c8c4a,color:#fff
Log Ingestion
RhythmX receives logs from LogRhythm's Log Distribution Services (LDS). LDS is configured within the LogRhythm platform to forward copies of collected logs to the RhythmX server over the network.
Supported Log Sources & Ports
| Log Source | Port | Protocol | Description |
|---|---|---|---|
| Windows Event Logs | 5514 | TCP / UDP | Windows Security, System, Sysmon, and Application event logs |
| Linux Sysmon | 5515 | TCP | Sysmon for Linux telemetry (process, network, file events) |
| Linux Auditd | 5516 | TCP | Linux Audit daemon logs (syscall, file access, auth events) |
Each log source has its own dedicated ingestion pipeline, ensuring that parsing logic, enrichment, and detection rules are tailored to the specific log format.
How Logs Get to RhythmX
- LogRhythm System Monitor Agents collect logs from Windows and Linux endpoints
- Logs are sent to the LogRhythm Mediator for initial processing
- The Mediator forwards logs to Log Distribution Services
- LDS is configured with a distribution policy that sends a copy of the logs to the RhythmX server's IP and designated port
- RhythmX's ingestion layer receives and begins processing
No additional agents are installed on endpoints — RhythmX leverages LogRhythm's existing collection infrastructure seamlessly.
Log Processing Pipeline
Once logs arrive, each pipeline performs the following steps:
1. Enrichment & Normalization
Incoming logs from LogRhythm carry metadata alongside the raw event data. RhythmX extracts the entity information and the original event payload, then enriches the raw log with source metadata to produce a normalized event ready for detection.
2. Malformed Event Handling
Events that cannot be parsed (missing fields, incomplete XML, encoding issues) are never dropped. They are routed to a separate malformed event stream with:
- A timestamp of when the parsing failure occurred
- The reason for the failure
- The full original event preserved for investigation
3. Log Rotation & Batching
Processed logs accumulate until they hit a configurable size threshold. At that point, the current log file is rotated and processed through the detection engine. This batching strategy balances near real-time detection with high throughput.
Sigma Detection Engine
RhythmX evaluates every log batch against a library of Sigma rules and produces structured alerts for any matches.
Built-in Rule Sets
RhythmX ships with curated Sigma rule sets covering common threat behaviors:
| Rule Set | Coverage |
|---|---|
| Windows Generic | Broad Windows event log detections |
| Windows Generic (High/Medium) | Severity-filtered subsets |
| Windows Sysmon | Process creation, network, file, registry events |
| Windows Sysmon (High/Medium) | Severity-filtered subsets |
| Linux Sysmon | Linux process, network, and file monitoring |
| Linux Auditd | Syscall-level detections, privilege escalation, file access |
Custom Sigma Rules
Teams can upload their own Sigma rules as .yml files to extend detection coverage. RhythmX supports separate custom rule directories for each log type:
- Custom Windows rules — applied to the Windows pipeline
- Custom Linux Sysmon rules — applied to the Linux Sysmon pipeline
- Custom Linux Auditd rules — applied to the Auditd pipeline
Custom rules follow the standard Sigma rule specification and are automatically picked up on the next detection cycle.
Rule Selection & Exclusion
During installation, operators choose which built-in rule sets to activate per pipeline. Additionally:
- Selection configs control which rules are active
- Exclusion configs allow suppressing specific rules (e.g., noisy or irrelevant rules for your environment)
This gives operators fine-grained control over detection coverage without modifying rule files.
Machine Learning — Anomaly Detection
After Sigma-based detections are generated, RhythmX applies a machine learning model to identify anomalous behaviors that may not match any existing rule.
flowchart LR
A["Sigma Alerts"] --> B["Feature Engineering"]
B --> C["ML Anomaly Detection"]
C --> D["Normal"]
C --> E["Anomalous"]
style A fill:#4a148c,stroke:#9c27b0,color:#fff
style B fill:#0d47a1,stroke:#42a5f5,color:#fff
style C fill:#00695c,stroke:#4db6ac,color:#fff
style D fill:#1b5e20,stroke:#4c8c4a,color:#fff
style E fill:#b71c1c,stroke:#f05545,color:#fff
How It Works
The ML engine runs on a continuous cycle, analyzing alerts over a rolling time window. For each entity (user or computer), it builds a behavioral profile and flags deviations from that profile as anomalous.
What the ML Engine Analyzes
The model evaluates multiple dimensions of each alert to determine whether the behavior is normal or anomalous:
| Signal Category | Examples |
|---|---|
| Alert context | Rule names, tactics, techniques, and severity |
| Command line behavior | Suspicious patterns, encoded commands, unusual tokens |
| Identity & system context | User, computer, event type, and provider |
| Behavioral patterns | Alert velocity, timing patterns, and network indicators |
Per-Entity Profiling
The model builds independent behavioral profiles for each entity, ensuring that what is normal for a database server is not applied as the baseline for a developer workstation. This eliminates cross-entity noise and produces highly targeted anomaly scores.
Output
Alerts are annotated with an ML classification — normal or anomalous — allowing analysts to prioritize investigation on behaviors that deviate from established patterns, even when no Sigma rule explicitly covers the activity.
Correlation Engine — Threat Use Cases
Beyond individual alert detection, RhythmX runs a correlation engine that identifies complex, multi-stage attack patterns by analyzing relationships across multiple alerts.
flowchart TD
A["Sigma Alerts +<br>ML Annotations"] --> B["Correlation Engine"]
B --> C["Lateral Movement"]
B --> D["Password Spraying"]
B --> E["APT Chains"]
B --> F["Ransomware Indicators"]
B --> G["18 more use cases..."]
C --> H["Cases"]
D --> H
E --> H
F --> H
G --> H
style A fill:#4a148c,stroke:#9c27b0,color:#fff
style B fill:#00695c,stroke:#4db6ac,color:#fff
style C fill:#0d47a1,stroke:#42a5f5,color:#fff
style D fill:#0d47a1,stroke:#42a5f5,color:#fff
style E fill:#0d47a1,stroke:#42a5f5,color:#fff
style F fill:#0d47a1,stroke:#42a5f5,color:#fff
style G fill:#0d47a1,stroke:#42a5f5,color:#fff
style H fill:#b71c1c,stroke:#f05545,color:#fff
21 Threat Detection Use Cases
The correlation engine evaluates alerts against 21 predefined attack patterns:
| Use Case | What It Detects |
|---|---|
| Lateral Movement | A user appearing across multiple machines with diverse attack tactics |
| Password Spraying | Same source targeting multiple user accounts in a short time window |
| Brute Force | Repeated authentication failures against a single account |
| APT Chain | Multi-stage persistent attack progressing through kill chain phases |
| Reconnaissance | Discovery and enumeration commands indicating pre-attack activity |
| Credential Theft | Credential dumping tools and techniques (Mimikatz, LSASS access) |
| Defense Evasion | Attempts to disable or tamper with security tools |
| PowerShell Abuse | Malicious PowerShell execution patterns (encoded commands, downloads) |
| Privilege Escalation | Techniques to elevate privileges beyond authorized levels |
| Persistence | Autorun entries, scheduled tasks, and other persistence mechanisms |
| LOLBins Campaign | Living-off-the-land binary abuse across multiple endpoints |
| DLL Sideloading | DLL hijacking and sideloading techniques |
| System Binary Anomaly | Unusual execution of legitimate system binaries |
| Remote Access Abuse | Unauthorized use of remote management tools |
| Installer Abuse | MSI and setup file exploitation |
| Parent-Child Anomaly | Unusual process parent-child relationships |
| Initial Access to Lateral | Progression from initial compromise to lateral movement |
| Credential Campaign | Coordinated credential attacks across the environment |
| Ransomware Indicators | Behavioral precursors to ransomware deployment |
| Rapid Fire Alerts | High-velocity alert patterns indicating active attack |
| APT36 Transparent Tribe | TTPs specific to the APT36 threat group |
How Correlation Works
- The engine runs on a continuous schedule, querying recent alerts
- Each use case defines thresholds and conditions (e.g., same user on 4+ machines with 5+ distinct tactics)
- When conditions are met, a case is created linking all related alerts
- Cases are assigned a severity based on the matched use case
- Cases sync back to LogRhythm for unified case management
Use cases are fully configurable — teams can adjust thresholds, add new patterns, or disable use cases to match their environment.
Detection Output
When the detection engine, ML model, or correlation engine produces a finding, it generates a structured alert containing:
| Field | Description |
|---|---|
| Title | Detection rule name |
| Description | What the rule detects |
| Severity | Informational, low, medium, high, or critical |
| MITRE ATT&CK | Mapped tactics and techniques |
| ML Classification | Normal or anomalous |
| Matched fields | The specific event fields that triggered the detection |
These detections are written in a LogRhythm-compatible format, enabling:
- Re-ingestion into LogRhythm for correlation and case management
- Direct alerting and dashboard integration within the LogRhythm platform
Performance & Scalability
RhythmX is engineered for high-throughput environments:
| Metric | Value |
|---|---|
| Sustained throughput | 20,000–25,000 EPS |
| Burst capacity (5–10 min) | 30,000–35,000 EPS |
| Detection latency | 60–120 seconds |
| Recommended hardware | 64GB RAM / 16 CPU cores |
Dedicated pipelines per log source, built-in queue management, and optimized processing ensure consistent performance even during traffic spikes.