A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … communications surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

NLP-based techniques for cyber threat intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - ar** attack behaviors described in threat analysis
reports to entries in an adversarial techniques knowledge base. Our method leverages a …

Actionable cyber threat intelligence using knowledge graphs and large language models

R Fieblinger, MT Alam, N Rastogi - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
Cyber threats are constantly evolving. Extracting actionable insights from unstructured Cyber
Threat Intelligence (CTI) data is essential to guide cybersecurity decisions. Increasingly …

Llmcloudhunter: Harnessing llms for automated extraction of detection rules from cloud-based cti

Y Schwartz, L Benshimol, D Mimran, Y Elovici… - arxiv preprint arxiv …, 2024 - arxiv.org
As the number and sophistication of cyber attacks have increased, threat hunting has
become a critical aspect of active security, enabling proactive detection and mitigation of …