A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the art

F Aldauiji, O Batarfi, M Bayousef - IEEE Access, 2022 - ieeexplore.ieee.org
Ransomware is one of the most harmful types of cyber attacks that cause major concerns on
a global scale. It makes the victims' resources unusable by encrypting data or locking …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

FedChain-Hunter: A reliable and privacy-preserving aggregation for federated threat hunting framework in SDN-based IIoT

PT Duy, NH Quyen, NH Khoa, TD Tran, VH Pham - Internet of Things, 2023 - Elsevier
In the development of the Industrial Internet of Things (IIoT), cyber threats and attacks have
become major issues and concerns in Industry 4.0 due to the negative impacts on the …

Multi-step attack detection in industrial control systems using causal analysis

Z Jadidi, J Hagemann, D Quevedo - Computers in Industry, 2022 - Elsevier
In the old generation of industrial control systems (ICSs), their sub-components
communicated within private networks and, therefore, it was assumed that ICSs are safe …

Design and development of automated threat hunting in industrial control systems

M Arafune, S Rajalakshmi, L Jaldon… - … and other Affiliated …, 2022 - ieeexplore.ieee.org
Traditional industrial systems, eg, power plants, water treatment plants, etc., were built to
operate highly isolated and controlled capacity. Recently, Industrial Control Systems (ICSs) …

Federated learning-based cyber threat hunting for apt attack detection in SDN-enabled networks

HT Thi, NDH Son, PT Duy… - 2022 21st International …, 2022 - ieeexplore.ieee.org
Threat hunting is the action of seeking harmful actors lurking in the network or the system in
the early stage with the assumption of attackers already broke the cy-ber defense solution …

Explainable artificial intelligence envisioned security mechanism for cyber threat hunting

P Kumar, M Wazid, DP Singh, J Singh… - Security and …, 2023 - Wiley Online Library
Cyber threat hunting proactively searches for cyber threats, which are undetected by the
traditional defense mechanisms. It scans deep to identify malicious programs (ie, malware) …

Bth: Behavior-based structured threat hunting framework to analyze and detect advanced adversaries

A Bhardwaj, K Kaushik, A Alomari, A Alsirhani… - Electronics, 2022 - mdpi.com
Organizations of every size and industry are facing a new normal. Adversaries have become
more sophisticated and persistent than ever before. Every network is facing never-ending …

Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database

B Al-Sada, A Sadighian, G Oligeri - IEEE Access, 2023 - ieeexplore.ieee.org
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and
procedures (TTP) based on real-world attack scenarios. It has been used in different sectors …