Published inTowards Data ScienceArchitecture of AI-Driven Security Operations with a Low False Positive RateThis article discusses a mindset on building production-ready machine learning solutions when applied to cyber-security needsApr 21, 20232Apr 21, 20232
Published inTowards Data ScienceWhich GPT-like Engineering Strategies Work on System Logs?Evaluation of Transformer Neural Network Modeling Methodologies applied to Behavior Malware Traces.Apr 21, 2023Apr 21, 2023
Published inTowards Data ScienceShell Language Processing: Machine Learning for Security Intrusion Detection with Linux auditdHow-to guide with code samples for specialists willing to apply data science techniques for solving cyber-security problems.Sep 22, 2022Sep 22, 2022
Published inTowards Data ScienceSecurity Data Science: Threat Hunting based on Zipf’s LawAnomaly detection engineering based on ubiquitous Zipfian distribution in enterprise security telemetry.Aug 28, 20221Aug 28, 20221
Design and setup of C2 traffic redirectorsThis article describes the Command & Control (C2) infrastructure design and provides a step-by-step setup of the C2 redirector.Jan 2, 2021Jan 2, 2021
Security Detections on Windows Events with Recurrent Neural NetworksPreprocessing of Sysmon Events, in order to use them as input of Recurrent Neural Network (RNN) model.Jun 30, 2020Jun 30, 2020
Published inRiga Data Science ClubSecurity Data Science: Analysis of Windows Event Logs using pandas DataFrameTransform XML into DataFrame, and as example identify malware Command & Control channel using statistics and visualisation.May 15, 2020May 15, 2020
Red Team: Use Case of Open Source WeaponizationToxic combination of WebDav, donut, Covenant and TikiSpawnJan 15, 20201Jan 15, 20201