LaBackDoor

AI Threat Hunting Lab: Week 1 Progress - Core Network & Visibility Online

A quick update on the AI Threat Hunting Lab! The core network backbone is now complete, featuring a Kali attacker, an Ubuntu client, pfSense for routing, and Splunk for centralized visibility. Hello everyone, and welcome back! Following my initial post, I’ve decided to switch this tracking journey to a weekly update to better capture the rapid progress of building out the AI Threat Hunting Lab.

I’m happy to report that the network backbone is now fully operational! This initial phase was crucial for establishing the foundational security and visibility layers before we dive into the machine learning components. This is the solid footing we need.


The Core Infrastructure is Online

As you can see in the provided diagram, the environment is now configured, establishing the Untrusted Network / Internet and the Management Network.

AI Threat Hunting Lab Diagram: Backbone Network


What’s Next: The AI Layer

With the traditional security foundation set, the next phase will be the most exciting—integrating the AI/LLM components.

The bottom section of the diagram—the LiteLLM Gateway, Local LLM Inference Server, MCP, and Vector Database—represents the core architecture for our target application we will be securing. The coming weeks will be spent deciding on the specific software/models for these roles and getting them wired into the network.

This was a short but important update. The lab has a heartbeat! Stay tuned for next week as we start configuring the first AI component.

Previous post
Starting the Journey to AI Security Engineering
Next post
AI Threat Hunting Lab: Week 2 - Network Deep Dive