IR-on-MAN: Interpretable Incident Inspector Based on Large-Scale Language Model and Association Mining
This talk introduces IR-on-MAN, a system that leverages Large Language Models (LLMs) and association mining to analyze command-line logs for incident response. The system addresses the challenges of parsing diverse, obfuscated, and context-dependent command-line arguments without relying on rigid regex-based detection rules. By embedding command lines into a unified feature space and mining significant tokens, the tool provides interpretable evidence for security analysts to identify malicious activity. The researchers demonstrate the system's effectiveness in a real-world red-team exercise, achieving high recall and precision.
Beyond Regex: Why Your SOC Needs Contextual Command-Line Analysis
TLDR: Traditional detection rules like regex often fail to catch obfuscated or context-dependent command-line attacks. The IR-on-MAN system uses Large Language Models and association mining to embed command lines into a unified feature space, allowing for the identification of malicious intent without rigid pattern matching. This approach significantly reduces false positives during incident response by focusing on the semantic meaning of commands rather than just their literal syntax.
Security operations centers are drowning in noise. Every day, millions of process creation events flood into SIEM platforms, and the vast majority are benign. When a real attack happens, the signal is buried under a mountain of administrative scripts, automated updates, and legitimate user activity. Most teams rely on static detection rules or regular expressions to filter this data. If an attacker changes a single flag, adds a random character, or uses a slightly different path, the regex breaks, and the alert never fires. This is the fundamental flaw in how we currently handle incident response.
The Failure of Static Detection
Attackers know exactly how we build our detection logic. They use techniques like command-line obfuscation to bypass simple string matching. If you have a rule looking for mimikatz.exe, an attacker might rename the binary, use a different path, or leverage built-in Windows tools like wmic or powershell to execute the same logic in memory.
During the research presented at Black Hat 2023, the team behind IR-on-MAN highlighted that even simple commands like hostname can be represented in dozens of different ways. When you scale this to complex post-exploitation tasks—like credential dumping or persistence via T1053.005—the number of possible variations becomes impossible to manage with manual rules. You end up with a brittle detection stack that requires constant maintenance and still misses the most sophisticated threats.
Moving to Semantic Analysis
Instead of trying to predict every possible way an attacker might type a command, we should be analyzing what the command actually does. The IR-on-MAN approach treats command lines as semantic units. By using a specialized embedding model, the system maps command lines into a high-dimensional feature space. In this space, commands that perform similar actions—even if they look completely different syntactically—cluster together.
This is where association mining becomes powerful. Once you have these clusters, you can identify "significant tokens." These are the specific parts of a command line that contribute most to its malicious classification. For example, in a credential dumping scenario, the system doesn't just look for the binary name. It identifies the combination of flags and arguments that are statistically associated with dumping the lsass.exe process memory.
If you are a pentester, think about how this changes your workflow. You no longer need to worry about whether your payload matches a specific regex pattern in the client's EDR. You are now fighting against a system that understands the intent of your actions. If you use a novel way to invoke a known technique, the system will likely still cluster your command with the malicious group because the underlying logic remains the same.
Practical Implications for Pentesters
During a red team engagement, you often have to balance stealth with speed. If you are testing a client's detection capabilities, you might intentionally use noisy techniques to see if they trigger an alert. With systems like this, the "noise" is no longer a binary state. The system can distinguish between a legitimate administrative task and an attacker attempting to escalate privileges using T1548.002.
The researchers demonstrated that this model can be trained on a relatively small dataset of about 4,000 command lines to achieve high accuracy. This is a massive improvement over traditional rule-based systems that require thousands of manually curated signatures. For those of us in the field, this means that the bar for "stealthy" execution is being raised. You can no longer rely on simple obfuscation to hide your tracks. You need to understand the behavioral baseline of the environment you are operating in.
A Path Forward for Defenders
Defenders should stop trying to write the perfect regex. It is a losing battle. Instead, focus on building behavioral baselines and leveraging models that can handle the inherent variability of command-line data. If you are working with a blue team, advocate for tools that provide interpretability. A black-box AI model that just says "malicious" is useless during an active incident. You need to know why it flagged a command. The IR-on-MAN approach of highlighting significant tokens provides exactly that—a clear, evidence-based reason for an alert, which allows analysts to make faster, more informed decisions.
The future of detection isn't about writing more rules. It is about understanding the semantic structure of the attacks we face. As we continue to see more sophisticated, living-off-the-land attacks, the ability to parse intent rather than syntax will become the standard for effective security monitoring. If you are building or testing detection systems, start looking at how you can incorporate these types of embedding models into your pipeline. The days of relying solely on static patterns are numbered.
Vulnerability Classes
Target Technologies
Attack Techniques
Up Next From This Conference

Chained to Hit: Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software

Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones

ODDFuzz: Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Counter Deception: Defending Yourself in a World Full of Lies

