Zantoras

A ZEOS Product — Patent Pending

CTCR

Cryptographic Threat Capture & Response

Behavioral threat detection built on the Physics of Data — measuring what attacks change, not what attacks look like.

26
Mathematical Detectors
712
Behavioral Threats
8
Detection Categories
100%
Validated Coverage
Become a Design Partner See Validation Results

The Physics of Data

Data has physical properties the same way matter has physical properties. These properties are measurable, invariant, and governed by mathematical laws — not learned heuristics.

"You don't need to identify the fuel to measure the heat."

— The Physics of Data, Zantoras 2026
Physics of Matter Measures CTCR Category Measures Detectors
MassQuantityVOLEvent magnitudezscore, cusum, mahalanobis
VelocityRate of changeTMPTiming patternscadence, spectral, hurst, time_of_day
DensityDistributionDSTData distributionsbenford, zipf, jsd
Crystal structureInternal orderSTRInformation contentkolmogorov, entropy_rate, wavelet
Phase changeState transitionBHVRole reversalsreader_writer, talker_quiet, unused_acct
GeometryForm & symmetrySHPTraffic shapesymmetric, fixed_payload, dest_freq, composite
Bond energyPersistenceSESSession lifecycleidle_session, ghost_session, dns_no_conn
ConservationEnergy balanceINTData integritydiff_rate, source_dropout, chain_integrity

8 Detection Categories

Each category measures an orthogonal dimension of data behavior. Together, they impose mathematically contradictory evasion requirements on any adversary.

CTCR-VOL

Volume Anomaly

Physics: Mass — how much exists in a region

Abnormal event magnitude. Z-score spikes, multivariate deviation, cumulative drift.

zscore cusum mahalanobis
CTCR-TMP

Temporal Anomaly

Physics: Velocity — rate of change over time

Abnormal timing. Cadence regularity, spectral periodicity, long-range dependence.

cadence spectral hurst time_of_day
CTCR-DST

Distribution Anomaly

Physics: Density — how matter distributes per volume

Abnormal data distributions. Benford's Law digit analysis, Zipf rank-frequency, Jensen-Shannon divergence.

benford zipf jsd
CTCR-STR

Structural Anomaly

Physics: Crystal structure — internal molecular order

Abnormal information content. Kolmogorov complexity, entropy rate, wavelet decomposition.

kolmogorov entropy_rate wavelet
CTCR-BHV

Behavioral Inversion

Physics: Phase change — solid to liquid state transitions

Behavioral role reversals. Read/write inversion, talker-goes-quiet, dormant account activation.

reader_writer talker_quiet unused_account
CTCR-SHP

Shape Anomaly

Physics: Geometry — spatial form and symmetry

Abnormal traffic geometry. Symmetric ratios, fixed payload rigidity, destination frequency.

symmetric fixed_payload dest_freq composite
CTCR-SES

Session Anomaly

Physics: Bond energy — how long connections persist

Abnormal session lifecycle. Idle abandonment, ghost sessions, DNS without connections.

idle_session ghost_session dns_no_conn
CTCR-INT

Integrity Anomaly

Physics: Conservation laws — energy cannot vanish

Abnormal data integrity. Diff rate spikes, source dropout, cryptographic chain verification.

diff_rate source_dropout chain_integrity

The Evasion Contradiction Principle

The 8 categories impose mathematically contradictory evasion constraints. An attacker who satisfies all 8 simultaneously is operating at the profile of legitimate traffic. That is not evasion — that is surrender.

To Evade...Attacker Must...Which Exposes...
VOL (Volume)Reduce data transfer rateRate-limits attack to speed of normal operations
TMP (Timing)Mimic human timing patternsConstrains throughput, cannot automate at scale
DST (Distribution)Match natural power-law distributionsConcentrates activity, limiting coverage
STR (Structure)Avoid encryption/encodingPayload visible in plaintext
BHV (Behavior)Maintain historical role patternsCannot pivot, escalate, or move laterally
SHP (Shape)Vary packet sizes and destinationsInefficient C2, unreliable channel
SES (Session)Limit session durationCannot maintain persistent access
INT (Integrity)Avoid modifying configurationsCannot disable defenses or install persistence

Validated at 100%

Every claim is tested. Every detector is measured. Every threat is validated. Not inferred — directly verified by the CTCR Attack Engine against a production system.

26/26
Detectors Fired
712/712
Threats Validated
81/81
Tiles Activated
8/8
Categories Covered
11/11
Data Sources

How We Test

The CTCR Attack Engine doesn't replay known attack signatures. It generates detector-specific mathematical anomalies — telemetry designed to violate the exact mathematical property each detector measures. This tests whether the instruments work, not whether they recognize a specific threat.

Each of 712 threats is tested individually: the engine generates anomaly flows for that threat's assigned detectors and verifies every detector fired. If any detector fails to fire, the threat fails. This is direct, per-threat-ID validation.

$ ctcr-attack --auto-ecs --matrix-path ctcr-matrix-v2.json ... ========== PER-THREAT-ID VALIDATION ========== 712/712 PASS | 0 FAIL | 0 SE | 0 UC Detectors used: 25/26 | Categories: 11/11 SHA-256: 7626b438321973b28bdcacb0d346cafe75e70d60a089f05ccbecaea662031487

A Different Kind of Detection

CTCR doesn't learn what attacks look like. It measures what attacks change.

Signature-BasedAI/ML-BasedCTCR (Mathematical)
Zero-day detectionNonePartial (depends on training)Complete
Evasion resistanceLow (known bypass)Medium (adversarial ML)Mathematical guarantee
Training data neededAttack samplesLarge labeled datasetsNone (mathematical laws)
Model driftN/ARequires retrainingNone (invariant)
ExplainabilityRule matchedBlack boxMathematical proof
Evidence integrityNo guaranteeNo guaranteeSHA-256 hash chain
Threat coverageKnown onlyTraining-dependent712/712 (100%)

Challenge Your Detection

Put your security platform to the 712-threat test. The CTCR Attack Engine generates mathematically rigorous anomalies that any detection system should catch. If it doesn't, you have a gap. If it does, you have proof.

Become a Design Partner ← Back to Platform