×
Community Blog Alibaba Cloud Releases Agentic NDR,Ushering Threat Detection and Response into the Age of Agents

Alibaba Cloud Releases Agentic NDR,Ushering Threat Detection and Response into the Age of Agents

This article introduces Alibaba Cloud's "Agentic NDR," a product that marks the entry of threat detection and response technology into a new era dominated by AI agents.

NDR_Agent_2x
When attackers can complete a full intrusion in just 29 minutes, while security teams are left needling in a haystack amidst over 4,000 alerts—this isn't a hypothetical scenario, but the reality of cloud security operations in 2026.

Alibaba Cloud Firewall has officially unveiled Agentic NDR. By deploying five AI agents to collaboratively "solve the case," it ushers threat detection and response into the age of agents.

The Operational Dilemma Behind Cloud Security Operations

In the process of serving a vast number of enterprise clients, the Alibaba Cloud Firewall team has deeply identified three core pain points in cloud security operations:

Pain Point 1: Advanced Obfuscated Attacks are "Invisible" to Traditional Rule EnginesAttacks like SQL injection and RCE bypass WAF/IDS systems through multi-layer encoding and polymorphic obfuscation. Once successful, attackers move laterally within the VPC without hindrance. Traditional engines are helpless against these "disguised" attacks, leaving east-west traffic as a blind spot.

Pain Point 2: High False Positive Rates in Sensitive File Exfiltration DetectionTraditional regex and keyword matching fail to reconstruct and identify sensitive data within files, nor can they distinguish between test data and actual privacy leaks. This leads to a flood of false positives or missed detections, causing security teams to face a "boy who cried wolf" crisis of trust.

Pain Point 3: Fragmented Alerts Make Attack Chain Reconstruction DifficultMassive amounts of isolated alerts lack contextual correlation, causing a single complete attack to be fragmented into multiple discrete events. Due to the lack of automated event aggregation and causal analysis capabilities, security analysts must spend excessive time on manual investigation and log stitching, resulting in delayed threat response.

Product Upgrade: Agentic NDR Unleashes Multi-Agent Collaborative "Superpowers"

Alibaba Cloud has released Agentic NDR, built upon a core architecture of "Multi-Agent Collaboration."Five specialized AI agents perform their distinct roles and collaborate automatically, forming a complete closed loop that spans from threat detection to attack溯源 (tracing) and coordinated response.

Operating via out-of-band traffic mirroring, this architecture is non-intrusive to your existing business setup. It natively integrates with cloud services to support HTTPS encrypted traffic inspection and provides comprehensive traffic coverage between ECS instances within a VPC and across different VPCs, effectively eliminating security blind spots in the internal network.

Furthermore, by combining capabilities like file reconstruction, behavior analysis, and full packet capture (FPC) for traffic replay, it deeply integrates with large language models (LLMs) to automatically conduct sophisticated threat analysis.

_NDR

Agent 1: Intelligent Detection Agent

By integrating the semantic understanding capabilities of large language models (LLMs), this agent deeply deconstructs the intent behind traffic code. It penetrates multi-layer encoding and obfuscation disguises to precisely identify attacks such as SQL injection. Through contextual analysis, it distinguishes between normal business operations and sensitive data exfiltration. It performs deep inspections on internal sensitive files and text transmissions, significantly reducing false positive rates.

Agent 2: Attack Verification Agent

This agent comprehensively evaluates malicious payloads and server responses to definitively determine whether an attack was "successful" or "attempted." It detects the lateral spread of attack behaviors within the internal network targeting compromised assets, as well as urgent or high-risk security events. Simultaneously, it rapidly locks onto genuine threat events amidst a sea of alerts, helping security teams focus on critical matters and improving operational efficiency.

Agent 3: Event Aggregation Agent

Based on attacking IPs and malicious signatures, this agent automatically aggregates semantically similar alerts into security events—for instance, monitoring abnormal internal login behaviors and protocol-level security risks. By combining asset profiling with business service analysis, it clearly presents "who is attacking what," significantly improving the signal-to-noise ratio of alerts and simplifying threat comprehension.

Agent 4: Event Analysis Agent

Equipped with active source expansion investigation capabilities, this agent extends its scope from single-point attacks to SSH private key theft, lateral movement, and C2 (Command and Control) external connections, automatically restoring the complete attack chain. As shown in the case study, this agent generates visual graphs containing entity topology and chronological phases. It clearly demonstrates how an attacker cuts in via a web vulnerability, uses stolen credentials to hop between multiple ECS instances in the internal network, and finally establishes a covert channel. This full-path traceability capability allows security personnel to intuitively grasp the full picture of an attack without manually stitching logs together. From the initial web entry point to SSH key theft, internal lateral movement, and C2 external connections—the complete attack chain is automatically reconstructed.

Agent_4▲ Attack Chain Panorama: Complete Attack Path from Initial Intrusion to Lateral Movement and C2 Exfiltration

Agent 5: Comprehensive Response Agent

This agent is responsible for automated case closure. It generates a panoramic view of the attack and a structured investigation report, extracts malicious Indicators of Compromise (IOCs), and coordinates with Cloud Firewall to enforce blocking.

As shown in the product interface, this agent automatically outputs detailed reports containing timelines, lists of affected assets, and recommended response actions, allowing for one-click execution of blocking policies. It achieves a closed-loop response process—from detection and tracing to blocking—without the need for human intervention. Evidence is preserved and post-incident reviews are completed automatically, reducing the average response time from hours to minutes.

Agent_5▲ Agent Incident Investigation Report: Dossier-style Structured Analysis

Enterprise Agent Governance Solution

Taking agents like OpenClaw as an example, Agentic NDR provides a comprehensive security governance solution.

(From the customer's perspective, this section illustrates how Agentic security accomplishes the governance of AI agents—a capability that traditional NDR solutions cannot deliver.)

1. Asset Inventory

Cloud Firewall automatically enables AI application asset discovery: It visualizes critical information regarding OpenClaw instances deployed by business units, including their quantity and exposure to the public internet.

1▲ Asset Inventory: Auto-Discovery of Cloud AI App Instances and Exposure Points

2. Behavior Discovery

Relying on its high-risk service identification capabilities, Agentic NDR requires no plugins on the business end. Through traffic analysis alone, it can detect high-risk vulnerabilities in AI applications that are hidden deep within the VPC but exposed to the outside world.

2▲ High-Risk Service Discovery: Identifies Externally Exposed OpenClaw Ports

3. File Reconstruction

Agentic NDR possesses the capability to reconstruct files directly from network traffic. It can fully restore transmitted files and data packets, automatically identifying sensitive information such as SSH private keys, authentication certificates, and API keys, thereby detecting sensitive data exfiltration via traffic.

3▲ Sensitive File/Text Detection: Restore and Identify Sensitive Files from Traffic

4. Semantic Auditing

For AI Skill plugins suspected of being malicious, Agentic NDR reconstructs them from traffic and submits them to the Cloud Sandbox for deep execution simulation. It analyzes whether risk behaviors such as privilege escalation or data exfiltration exist, thereby safeguarding enterprise core data assets.

4_1▲ Cloud Sandbox Skill Security Report: Detection of Hardcoded API Keys, WebShells, and Other Risks
_
4_3

5. Full Traffic Inspection

Regarding OpenClaw-related vulnerability attacks and malicious traffic, Agentic NDR not only detects threats rapidly but also retains the original attack packets as digital evidence.

5_1▲ Traffic Investigation: In-depth Analysis of OpenClaw-related Network Traffic
5_2▲ PCAP Retention: Agentic NDR Preserves Complete Raw Attack Packets for Forensics and Traceability

6. Closed-Loop Response

Upon detecting a threat, Agentic NDR orchestrates with Cloud Firewall to deploy blocking policies, achieving a seamless transition from "threat discovery" to "access denial."

6_1▲ Coordinated Response: Agentic NDR Auto-Extracts Malicious IPs for Coordinated Blocking
6_2▲ Coordinated Response: Agentic NDR Supports Full Lifecycle Management of Mitigation Actions
6_3▲ Policy Configuration: Sync with Cloud Firewall to Generate Block Rules

The release of Agentic NDR empowers Alibaba Cloud users with distinct advantages over traditional NDR solutions, driven by the power of Large Language Models:

Detection: LLM-powered semantic understanding penetrates advanced obfuscation, uncovering stealthy attacks that traditional rule-based engines fail to identify.

Tracing: Through multi-agent collaboration, the system automates the entire workflow—from alert aggregation and attack chain reconstruction to coordinated response. This compresses what used to be hours of manual investigation into just minutes.

Governance: It provides a comprehensive governance solution against malicious actors, covering the full lifecycle from asset discovery and threat detection to coordinated blocking.

More importantly, the LLM capabilities within Agentic NDR continuously learn the latest offensive and defensive technologies. Its defense capabilities dynamically iterate and strengthen alongside the evolving threat landscape—an evolutionary capability that is simply impossible for traditional rule engines to achieve.

Alibaba Cloud Firewall Agentic NDR is now officially available. We invite you to log in to the Alibaba Cloud Firewall console to experience it today.

🔗:https://www.alibabacloud.com/help/en/cloud-firewall/network-detection-and-response/product-overview/what-is-xx

0 1 0
Share on

CloudSecurity

22 posts | 0 followers

You may also like

Comments

CloudSecurity

22 posts | 0 followers

Related Products