Articles with "threat hunting" as a keyword



A Threat Hunting Framework for Industrial Control Systems

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3133260

Abstract: An Industrial Control System (ICS) adversary often takes different actions to exploit vulnerabilities, pass the border between Information Technology (IT) and Operational Technology (OT) networks, and launch a targeted attack against OT networks. Detecting these… read more here.

Keywords: threat hunting; threat; industrial control; hunting framework ... See more keywords

Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3181278

Abstract: Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments.… read more here.

Keywords: threat hunting; cyber threat; ransomware attacks; ransomware ... See more keywords

Hypothesis Generation Model for Cyber Threat Hunting

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Communications Magazine"

DOI: 10.1109/mcom.001.2300224

Abstract: Cyber attackers are rapidly developing their attack tactics and techniques, and their threats already pose a great danger to the world. Using cyber threat intelligence, security analysts make attack reconstruction possible, and human analysts are… read more here.

Keywords: threat hunting; hypothesis generation; threat; cyber threat ... See more keywords

MABAT: A Multi-Armed Bandit Approach for Threat-Hunting

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3215010

Abstract: Threat hunting relies on cyber threat intelligence to perform active hunting of prospective attacks instead of waiting for an attack to trigger some pre-configured alerts. One of the most important aspects of threat hunting is… read more here.

Keywords: threat hunting; data collection; targeted data; threat ... See more keywords

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3168011

Abstract: Nowadays, blockchain-based technologies are being developed in various industries to improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based network is one of the most notable applications of blockchain… read more here.

Keywords: blockchain based; iiot networks; based iiot; hunter ... See more keywords

From TTP to IoC: Advanced Persistent Graphs for Threat Hunting

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2021.3056999

Abstract: Defenders fighting against Advanced Persistent Threats need to discover the propagation area of an adversary as quickly as possible. This discovery takes place through a phase of an incident response operation called Threat Hunting, where… read more here.

Keywords: ttp ioc; threat; defender; threat hunting ... See more keywords

AUTOMA: Automated Generation of Attack Hypotheses and Their Variants for Threat Hunting Using Knowledge Discovery

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2024.3378972

Abstract: Threat hunting is a proactive security defense line exercised to uncover attacks that could circumvent conventional detection mechanisms. It is based on an iterative approach to generate, inspect, and revise attack hypotheses. The quality of… read more here.

Keywords: threat hunting; attack; knowledge; generation ... See more keywords

Elasticsearch-Based Threat Hunting to Detect Privilege Escalation Using Registry Modification and Process Injection Attacks

Sign Up to like & get
recommendations!
Published in 2025 at "Future Internet"

DOI: 10.3390/fi17090394

Abstract: Malicious actors often exploit persistence mechanisms, such as unauthorized modifications to Windows startup directories or registry keys, to achieve privilege escalation and maintain access on compromised systems. While information technology (IT) teams legitimately use these… read more here.

Keywords: threat hunting; registry; event; privilege escalation ... See more keywords

SGMNet: A Supervised Seeded Graph-Matching Method for Cyber Threat Hunting

Sign Up to like & get
recommendations!
Published in 2025 at "Symmetry"

DOI: 10.3390/sym17060898

Abstract: Proactively hunting known attack behaviors within system logs, termed threat hunting, is gaining traction in cybersecurity. Existing methods typically rely on constructing a query graph representing known attack patterns and identifying it as a subgraph… read more here.

Keywords: seeded graph; threat hunting; supervised seeded; threat ... See more keywords