Articles with "threat hunting" as a keyword



Photo by sebastianpoc from unsplash

A Threat Hunting Framework for Industrial Control Systems

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3133260

Abstract: An Industrial Control System (ICS) adversary often takes different actions to exploit vulnerabilities, pass the border between Information Technology (IT) and Operational Technology (OT) networks, and launch a targeted attack against OT networks. Detecting these… read more here.

Keywords: threat hunting; threat; industrial control; hunting framework ... See more keywords
Photo by sebastianpoc from unsplash

Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3181278

Abstract: Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments.… read more here.

Keywords: threat hunting; cyber threat; ransomware attacks; ransomware ... See more keywords

MABAT: A Multi-Armed Bandit Approach for Threat-Hunting

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3215010

Abstract: Threat hunting relies on cyber threat intelligence to perform active hunting of prospective attacks instead of waiting for an attack to trigger some pre-configured alerts. One of the most important aspects of threat hunting is… read more here.

Keywords: threat hunting; data collection; targeted data; threat ... See more keywords
Photo by arthurbizkit from unsplash

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3168011

Abstract: Nowadays, blockchain-based technologies are being developed in various industries to improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based network is one of the most notable applications of blockchain… read more here.

Keywords: blockchain based; iiot networks; based iiot; hunter ... See more keywords
Photo by timtrad from unsplash

From TTP to IoC: Advanced Persistent Graphs for Threat Hunting

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Network and Service Management"

DOI: 10.1109/tnsm.2021.3056999

Abstract: Defenders fighting against Advanced Persistent Threats need to discover the propagation area of an adversary as quickly as possible. This discovery takes place through a phase of an incident response operation called Threat Hunting, where… read more here.

Keywords: ttp ioc; threat; defender; threat hunting ... See more keywords