Command Intelligence for Behavioral Threat Detection and MITRE ATT&CK Attribution
Genos is a cybersecurity research prototype for analyzing command-line activity. It combines deobfuscation, classification, and MITRE ATT&CK attribution across three research prototypes and two IEEE-accepted papers.
Genos converts command-line telemetry into structured security outputs: verdicts, behavioral signals, and MITRE ATT&CK mappings.
The research addresses a core detection challenge: obfuscated and encoded commands often evade signature-based methods. The v1.1 prototype uses a two-stage CodeBERT pipeline: a binary Gatekeeper for initial classification and a Specialist model for ATT&CK technique attribution. Paper [2] evaluated 141-class attribution; the current prototype uses a smaller active technique set.
Each version is a distinct research prototype — not a commercial release. Whitepapers document the system design, methodology, and evaluation results for each prototype.
An open-source EDR research prototype built around Windows Security Event Log telemetry and machine-learning-based classification for benign activity plus three attack classes.
Evaluates a cascaded CodeBERT pipeline for command-line classification and MITRE ATT&CK technique attribution, with deobfuscation-aware preprocessing.
Packages the v1.1 inference pipeline as a deployable prototype and conducts a formal benchmark comparison against LLM-based classification approaches.
Results are from controlled research datasets. They should be interpreted within the evaluation methodology described in the associated IEEE publications.
Both papers were accepted to the IEEE World AI IoT Congress (AIIoT 2026), Seattle, USA. PDFs will be linked upon publication in the IEEE digital library.
Presents an open-source endpoint detection research prototype built around Windows Security Event Log telemetry and machine-learning-based classification. The system evaluates benign activity plus three attack classes and discusses a user-mode detection architecture without kernel drivers.
Presents a two-stage CodeBERT-based framework for command-line classification and MITRE ATT&CK technique attribution. The system combines recursive deobfuscation, binary Gatekeeper classification, and 141-class Specialist attribution, with evaluation across accuracy, Top-k attribution, macro-F1, and latency.
Planned research directions for subsequent prototypes and publications.
kubectl exec, AWS CloudTrail, Kubernetes audit logs.