Nov. 13, 2023, 2:10 a.m. | Sihat Afnan, Mushtari Sadia, Shahrear Iqbal, Anindya Iqbal

cs.CR updates on arXiv.org arxiv.org

Cyber attacks are often identified using system and network logs. There have
been significant prior works that utilize provenance graphs and ML techniques
to detect attacks, specifically advanced persistent threats, which are very
difficult to detect. Lately, there have been studies where transformer-based
language models are being used to detect various types of attacks from system
logs. However, no such attempts have been made in the case of APTs. In
addition, existing state-of-the-art techniques that use system provenance
graphs, lack …

advanced advanced persistent threats apt attacks attention cyber cyber attacks detect detection graphs language language models logs network persistent persistent threats provenance studies system techniques threats

Network Security Analyst

@ Wiz | Tel Aviv

Penetration Testing Staff Engineer- Turkey Remote

@ SonicWall | Istanbul, Istanbul, Türkiye

Physical Security Engineer

@ Microsoft | Atlanta, Georgia, United States

Junior Security Consultant (m/w/d)

@ Deutsche Telekom | Berlin, Deutschland

Senior Cybersecurity Product Specialist - Security Endpoint Protection

@ Pacific Gas and Electric Company | San Ramon, CA, US, 94583

Security Engineer, Pre-Sales (PA/NJ)

@ Vectra | US - South New Jersey, US - Pennsylvania