all InfoSec news
Threat Trekker: An Approach to Cyber Threat Hunting. (arXiv:2310.04197v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
Threat hunting is a proactive methodology for exploring, detecting and
mitigating cyberattacks within complex environments. As opposed to conventional
detection systems, threat hunting strategies assume adversaries have
infiltrated the system; as a result they proactively search out any unusual
patterns or activities which might indicate intrusion attempts.
Historically, this endeavour has been pursued using three investigation
methodologies: (1) Hypothesis-Driven Investigations; (2) Indicator of
Compromise (IOC); and (3) High-level machine learning analysis-based
approaches. Therefore, this paper introduces a novel machine learning …
adversaries cyber cyberattacks cyber threat cyber threat hunting detection endeavour environments hunting intrusion patterns proactive result search strategies system systems threat threat hunting