Evidential Cyber Threat Hunting

04/21/2021
by   Frederico Araujo, et al.
0

A formal cyber reasoning framework for automating the threat hunting process is described. The new cyber reasoning methodology introduces an operational semantics that operates over three subspaces – knowledge, hypothesis, and action – to enable human-machine co-creation of threat hypotheses and protective recommendations. An implementation of this framework shows that the approach is practical and can be used to generalize evidence-based multi-criteria threat investigations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/10/2022

A systematic literature review on cyber threat hunting

Since the term "Cyber threat hunting" was introduced in 2016, there have...
research
01/18/2020

Research Directions in Cyber Threat Intelligence

Cyber threat intelligence is a relatively new field that has grown from ...
research
03/05/2021

Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence

Cyber threat intelligence is the provision of evidence-based knowledge a...
research
10/20/2021

On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence

Motivated by the introduction of CACAO, the first open standard that har...
research
01/17/2021

A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence

Log-based cyber threat hunting has emerged as an important solution to c...
research
04/26/2018

A Formal Approach to Analyzing Cyber-Forensics Evidence

The frequency and harmfulness of cyber-attacks are increasing every day,...
research
02/08/2021

Generating Fake Cyber Threat Intelligence Using Transformer-Based Models

Cyber-defense systems are being developed to automatically ingest Cyber ...

Please sign up or login with your details

Forgot password? Click here to reset