all InfoSec news
Living-off-The-Land Reverse-Shell Detection by Informed Data Augmentation
Feb. 29, 2024, 5:11 a.m. | Dmitrijs Trizna, Luca Demetrio, Battista Biggio, Fabio Roli
cs.CR updates on arXiv.org arxiv.org
Abstract: The living-off-the-land (LOTL) offensive methodologies rely on the perpetration of malicious actions through chains of commands executed by legitimate applications, identifiable exclusively by analysis of system logs. LOTL techniques are well hidden inside the stream of events generated by common legitimate activities, moreover threat actors often camouflage activity through obfuscation, making them particularly difficult to detect without incurring in plenty of false alarms, even using machine learning. To improve the performance of models in such …
actions analysis applications arxiv augmentation cs.cr cs.lg data detection events generated hidden legitimate applications logs lotl malicious offensive reverse shell stream system techniques threat threat actors
More from arxiv.org / cs.CR updates on arXiv.org
IDEA: Invariant Defense for Graph Adversarial Robustness
2 days, 11 hours ago |
arxiv.org
FairCMS: Cloud Media Sharing with Fair Copyright Protection
2 days, 11 hours ago |
arxiv.org
Efficient unitary designs and pseudorandom unitaries from permutations
2 days, 11 hours ago |
arxiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Network Security Engineer
@ Meta | Menlo Park, CA | Remote, US
Security Engineer, Investigations - i3
@ Meta | Washington, DC
Threat Investigator- Security Analyst
@ Meta | Menlo Park, CA | Seattle, WA | Washington, DC
Security Operations Engineer II
@ Microsoft | Redmond, Washington, United States
Engineering -- Tech Risk -- Global Cyber Defense & Intelligence -- Bug Bounty -- Associate -- Dallas
@ Goldman Sachs | Dallas, Texas, United States