Page 143 - Cyber Defense eMagazine August 2024
P. 143

Correlating logs and identifying patterns.

            Callable functions based on the schema of each of the micro structured logs and has the description that
            describes the capabilities (essentially each function can be thought as a procedure finder in Mitre attack
            TTP parlance)





























            Understanding threats and executing precise queries to detect emerging threats


            An LLM agent that comprehends a described threat, makes queries various stores with specific schemas,
            and identifies emerging threats.

























            The  above  approach  not  only  will  make  detection  engineering  possible  without  SIEM  and  SOAR  but
            would  make  security  engineers  focus  on  actual  development  of  code  to  detect  new  and  emerging
            procedures as opposed to learn how to work with SIEM and write SOAR playbooks.






            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          143
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   138   139   140   141   142   143   144   145   146   147   148