Turning the Hunted into the Hunter via Threat Hunting: Life Cycle, Ecosystem, Challenges and the Great Promise of AI

04/23/2022
by   Caroline Hillier, et al.
0

The threat hunting lifecycle is a complex atmosphere that requires special attention from professionals to maintain security. This paper is a collection of recent work that gives a holistic view of the threat hunting ecosystem, identifies challenges, and discusses the future with the integration of artificial intelligence (AI). We specifically establish a life cycle and ecosystem for privacy-threat hunting in addition to identifying the related challenges. We also discovered how critical the use of AI is in threat hunting. This work paves the way for future work in this area as it provides the foundational knowledge to make meaningful advancements for threat hunting.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/16/2022

CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models

As the practicality of Artificial Intelligence (AI) and Machine Learning...
research
12/11/2017

Cogniculture: Towards a Better Human-Machine Co-evolution

Research in Artificial Intelligence is breaking technology barriers ever...
research
04/07/2022

Human-AI ecosystem with abrupt changes as a function of the composition

The progressive advent of artificial intelligence machines may represent...
research
05/18/2023

Taxonomy of AISecOps Threat Modeling for Cloud Based Medical Chatbots

Artificial Intelligence (AI) is playing a vital role in all aspects of t...
research
08/30/2023

AI-powered Fraud Detection in Decentralized Finance: A Project Life Cycle Perspective

In recent years, blockchain technology has introduced decentralized fina...
research
04/01/2022

Machine Learning and Artificial Intelligence in Circular Economy: A Bibliometric Analysis and Systematic Literature Review

With unorganized, unplanned and improper use of limited raw materials, a...
research
03/01/2022

Unified Physical Threat Monitoring System Aided by Virtual Building Simulation

With increasing physical threats in recent years targeted at critical in...

Please sign up or login with your details

Forgot password? Click here to reset