Jan. 20, 2022, 2:20 a.m. | M. Andrecut

cs.CR updates on arXiv.org arxiv.org

Behavioral Indicators of Compromise are associated with various automated
methods used to extract the sample behavior by observing the system function
calls performed in a virtual execution environment. Thus, every sample is
described by a set of BICs triggered by the sample behavior in the sandbox
environment. Here we discuss a Machine Learning approach to the classification
of the sandbox samples as MALICIOUS or BENIGN, based on the list of triggered
BICs. Besides the more traditional methods like Logistic Regression …

classification compromise indicators of compromise sandbox

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Compliance Architect - Experian Health (Can be REMOTE from anywhere in the US)

@ Experian | ., ., United States

IT Security Specialist

@ Ørsted | Kuala Lumpur, MY

Senior, Cyber Security Analyst

@ Peloton | New York City

Cyber Security Engineer | Perimeter | Firewall

@ Garmin Cluj | Cluj-Napoca, Cluj County, Romania

Pentester / Ethical Hacker Web/API - Vast/Freelance

@ Resillion | Brussels, Belgium