Despite sophisticated threat and detection tools, cyber adversaries have proven that they are able to maintain a presence on a victim’s network.