Evidential cyber threat hunting
… A case graph G stores the state of a hunt, including the history of executed hunting steps …
of a hunt. Hunts and case graphs are two central concepts in our threat hunting model, …
of a hunt. Hunts and case graphs are two central concepts in our threat hunting model, …
Evidential classification and feature selection for cyber-threat hunting
M Beechey, KG Kyriakopoulos… - Knowledge-Based Systems, 2021 - Elsevier
… Evidential classifiers attempt to avoid incorrect binary … An evidential classifier’s basic principles
are rooted in Evidence … FS system, which utilises evidential classifier based analysis of a …
are rooted in Evidence … FS system, which utilises evidential classifier based analysis of a …
A survey on threat hunting in enterprise networks
… This survey studies the threat hunting concept and provides a … In particular, we provide a
threat hunting taxonomy based on … evidential multicriteria cyber reasoning framework for threat …
threat hunting taxonomy based on … evidential multicriteria cyber reasoning framework for threat …
Discovering US Government Threat Hunting Processes and Improvements
WP Maxam III - 2023 - search.proquest.com
… , 1 hour in length, with government threat hunters. The transcripts of these interviews were
… threat hunters. Common challenges and suggested solutions brought up by threat hunters …
… threat hunters. Common challenges and suggested solutions brought up by threat hunters …
AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery
B Nour, M Pourzandi, RK Qureshi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
… In our work, we consider threat hunting as a separate activity that is used to further enforce
security and proactively pursue advanced threats and adversaries. Therefore, our work for hy…
security and proactively pursue advanced threats and adversaries. Therefore, our work for hy…
[PDF][PDF] An Interview Study on Third-Party Cyber Threat Hunting Processes in the US Department of Homeland Security
WP Maxam III, JC Davis - arXiv preprint arXiv:2402.12252, 2024 - usenix.org
… As threat hunting is a new cybersecurity discipline, most TH teams operate without a … study
of threat hunt practitioners. We obtained access and interviewed 11 threat hunters associated …
of threat hunt practitioners. We obtained access and interviewed 11 threat hunters associated …
Enhancements to Threat, Vulnerability, and Mitigation Knowledge for Cyber Analytics, Hunting, and Simulations
E Hemberg, MJ Turner, N Rutar… - Digital Threats: Research …, 2024 - dl.acm.org
… In this section, we demonstrate how ML research could in practice serve digital threat
knowledge-base curators, threat hunters, and cyber security analysts. We present an ML-based …
knowledge-base curators, threat hunters, and cyber security analysts. We present an ML-based …
Accurify: Automated New Testflows Generation for Attack Variants in Threat Hunting
B Nour, M Pourzandi, R Kamran Qureshi… - … on Foundations and …, 2023 - Springer
… team during a security breach, ie attack already happened, we use playbooks in threat
hunting to guiding security hunters in their proactive testing, ie an attack might be lurking. …
hunting to guiding security hunters in their proactive testing, ie an attack might be lurking. …
Threat hunting using elastic stack: An evaluation
K Subramanian, W Meng - 2021 IEEE International Conference …, 2021 - ieeexplore.ieee.org
… threat hunting and compare it with four similar tools. It is found that Elastic Stack tool can
be effective in detecting the threats… Evidential classification and feature selection for cyber-threat …
be effective in detecting the threats… Evidential classification and feature selection for cyber-threat …
A systematic literature review on cyber threat hunting
Z Wang - arXiv preprint arXiv:2212.05310, 2022 - arxiv.org
… of cyber threat hunting, and our goal is to anaylyze these studies and find the modern
trend for cyber threat hunting. To … “Evidential classification and feature selection for cyber-threat …
trend for cyber threat hunting. To … “Evidential classification and feature selection for cyber-threat …
Recherches associées
- systematic literature review cyber threat hunting
- cyber threat intelligence
- machine learning cybersecurity threats
- cyber threat analysis
- threat hunting active cyber defense
- threat hunting cyber security model
- threat hunting attack variants
- threat hunting audit logs
- cyber threat situational awareness
- threat hunting elastic stack
- cyber threat detection
- cyber threat rationality constraints
- threat hunting enterprise networks
- cyber threat department of homeland security
- threat hunting automated generation
- cyber threats security operation centers