Detection, Explanation and Filtering of Cyber Attacks Combining Symbolic and Sub-Symbolic Methods