I. Introduction
Over the years, several network tools such as antivirus software, intrusion prevention systems (IPSs) and intrusion detection systems (IDSs), have been developed to detect anomalies in a network environment. However, the mechanisms sustaining these approaches have focused on everyday volumetric anomalies, but have failed in addressing silent long-term security breaches. These stealthy threats can remain undetectable for a long period of time, causing tremendous leak of information, including private ones. To address this challenge, the AEN model has been proposed [1] as a new graph framework approach for detecting not only traditional network attacks, but also long-term attacks. AEN can be used to perform a continuous real-time analysis of a network while capturing the silent network attacks that can be undetected using regular or conventional detection mechanisms [1].