Evidential cyber threat hunting

F Araujo, D Kirat, X Shu, T Taylor, J Jang - arXiv preprint arXiv:2104.10319, 2021 - arxiv.org
… A case graph G stores the state of a hunt, including the history of executed hunting steps …
of a hunt. Hunts and case graphs are two central concepts in our threat hunting model, …

Evidential classification and feature selection for cyber-threat hunting

M Beechey, KG Kyriakopoulos… - Knowledge-Based Systems, 2021 - Elsevier
Evidential classifiers attempt to avoid incorrect binary … An evidential classifier’s basic principles
are rooted in Evidence … FS system, which utilises evidential classifier based analysis of a …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
… This survey studies the threat hunting concept and provides a … In particular, we provide a
threat hunting taxonomy based on … evidential multicriteria cyber reasoning framework for threat

Discovering US Government Threat Hunting Processes and Improvements

WP Maxam III - 2023 - search.proquest.com
… , 1 hour in length, with government threat hunters. The transcripts of these interviews were
threat hunters. Common challenges and suggested solutions brought up by threat hunters

AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery

B Nour, M Pourzandi, RK Qureshi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
… In our work, we consider threat hunting as a separate activity that is used to further enforce
security and proactively pursue advanced threats and adversaries. Therefore, our work for hy…

[PDF][PDF] An Interview Study on Third-Party Cyber Threat Hunting Processes in the US Department of Homeland Security

WP Maxam III, JC Davis - arXiv preprint arXiv:2402.12252, 2024 - usenix.org
… As threat hunting is a new cybersecurity discipline, most TH teams operate without a … study
of threat hunt practitioners. We obtained access and interviewed 11 threat hunters associated …

Enhancements to Threat, Vulnerability, and Mitigation Knowledge for Cyber Analytics, Hunting, and Simulations

E Hemberg, MJ Turner, N Rutar… - Digital Threats: Research …, 2024 - dl.acm.org
… In this section, we demonstrate how ML research could in practice serve digital threat
knowledge-base curators, threat hunters, and cyber security analysts. We present an ML-based …

Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting

B Nour, M Pourzandi, R Kamran Qureshi… - … on Foundations and …, 2023 - Springer
… team during a security breach, ie attack already happened, we use playbooks in threat
hunting to guiding security hunters in their proactive testing, ie an attack might be lurking. …

Threat hunting using elastic stack: An evaluation

K Subramanian, W Meng - 2021 IEEE International Conference …, 2021 - ieeexplore.ieee.org
threat hunting and compare it with four similar tools. It is found that Elastic Stack tool can
be effective in detecting the threatsEvidential classification and feature selection for cyber-threat

A systematic literature review on cyber threat hunting

Z Wang - arXiv preprint arXiv:2212.05310, 2022 - arxiv.org
… of cyber threat hunting, and our goal is to anaylyze these studies and find the modern
trend for cyber threat hunting. To … “Evidential classification and feature selection for cyber-threat