Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3133260
Abstract: An Industrial Control System (ICS) adversary often takes different actions to exploit vulnerabilities, pass the border between Information Technology (IT) and Operational Technology (OT) networks, and launch a targeted attack against OT networks. Detecting these…
read more here.
Keywords:
threat hunting;
threat;
industrial control;
hunting framework ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3181278
Abstract: Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments.…
read more here.
Keywords:
threat hunting;
cyber threat;
ransomware attacks;
ransomware ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Communications Magazine"
DOI: 10.1109/mcom.001.2300224
Abstract: Cyber attackers are rapidly developing their attack tactics and techniques, and their threats already pose a great danger to the world. Using cyber threat intelligence, security analysts make attack reconstruction possible, and human analysts are…
read more here.
Keywords:
threat hunting;
hypothesis generation;
threat;
cyber threat ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3215010
Abstract: Threat hunting relies on cyber threat intelligence to perform active hunting of prospective attacks instead of waiting for an attack to trigger some pre-configured alerts. One of the most important aspects of threat hunting is…
read more here.
Keywords:
threat hunting;
data collection;
targeted data;
threat ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2022.3168011
Abstract: Nowadays, blockchain-based technologies are being developed in various industries to improve data security. In the context of the Industrial Internet of Things (IIoT), a chain-based network is one of the most notable applications of blockchain…
read more here.
Keywords:
blockchain based;
iiot networks;
based iiot;
hunter ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Transactions on Network and Service Management"
DOI: 10.1109/tnsm.2021.3056999
Abstract: Defenders fighting against Advanced Persistent Threats need to discover the propagation area of an adversary as quickly as possible. This discovery takes place through a phase of an incident response operation called Threat Hunting, where…
read more here.
Keywords:
ttp ioc;
threat;
defender;
threat hunting ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Transactions on Network and Service Management"
DOI: 10.1109/tnsm.2024.3378972
Abstract: Threat hunting is a proactive security defense line exercised to uncover attacks that could circumvent conventional detection mechanisms. It is based on an iterative approach to generate, inspect, and revise attack hypotheses. The quality of…
read more here.
Keywords:
threat hunting;
attack;
knowledge;
generation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Future Internet"
DOI: 10.3390/fi17090394
Abstract: Malicious actors often exploit persistence mechanisms, such as unauthorized modifications to Windows startup directories or registry keys, to achieve privilege escalation and maintain access on compromised systems. While information technology (IT) teams legitimately use these…
read more here.
Keywords:
threat hunting;
registry;
event;
privilege escalation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Symmetry"
DOI: 10.3390/sym17060898
Abstract: Proactively hunting known attack behaviors within system logs, termed threat hunting, is gaining traction in cybersecurity. Existing methods typically rely on constructing a query graph representing known attack patterns and identifying it as a subgraph…
read more here.
Keywords:
seeded graph;
threat hunting;
supervised seeded;
threat ... See more keywords