A survey on threat hunting in enterprise networks
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Automa: Automated generation of attack hypotheses and their variants for threat hunting using knowledge discovery
Threat hunting is a proactive security defense line exercised to uncover attacks that could
circumvent conventional detection mechanisms. It is based on an iterative approach to …
circumvent conventional detection mechanisms. It is based on an iterative approach to …
Protecting IEC 60870-5-104 ICS/SCADA systems with honeypots
Both signature-based and anomaly-based Intrusion Detection and Prevention System
(IDPS) have already demonstrated their efficiency towards recognising and mitigating …
(IDPS) have already demonstrated their efficiency towards recognising and mitigating …
AI at the Physical Layer for Wireless Network Security and Privacy
The chapter aims to provide readers with a comprehensive understanding of AI's role in
enhancing the detection, prevention, and mitigation of network threats for safeguarding …
enhancing the detection, prevention, and mitigation of network threats for safeguarding …
Strategic honeypot deployment in ultra-dense beyond 5g networks: A reinforcement learning approach
The progression of Software Defined Networking (SDN) and the virtualisation technologies
lead to the beyond 5G era, providing multiple benefits in the smart economies. However …
lead to the beyond 5G era, providing multiple benefits in the smart economies. However …
Turning the Hunted into the Hunter via Threat Hunting: Life Cycle, Ecosystem, Challenges and the Great Promise of AI
C Hillier, T Karroubi - arxiv preprint arxiv:2204.11076, 2022 - arxiv.org
The threat hunting lifecycle is a complex atmosphere that requires special attention from
professionals to maintain security. This paper is a collection of recent work that gives a …
professionals to maintain security. This paper is a collection of recent work that gives a …
Risk‐Aware SDN Defense Framework Against Anti‐Honeypot Attacks Using Safe Reinforcement Learning
D Gao, C Guo, Y Zhang, W Ji, Z Lv, Z Li… - … Journal of Network …, 2024 - Wiley Online Library
The development of multiple attack methods by external attackers in recent years poses a
huge challenge to the security and efficient operation of software‐defined networks (SDN) …
huge challenge to the security and efficient operation of software‐defined networks (SDN) …
ThreatScout: Automated Threat Hunting Solution Using Machine Reasoning
In this article, we present ThreatScout, an automated threat hunting solution leveraging
machine reasoning. Our evaluation on five threat actors shows hunting rates up to 92 …
machine reasoning. Our evaluation on five threat actors shows hunting rates up to 92 …
Detecting Complex Cyber Attacks Using Decoys with Online Reinforcement Learning
M Gutierrez - 2023 - search.proquest.com
Most vulnerabilities discovered in cybersecurity can be associated with their own singular
piece of software. I investigate complex vulnerabilities, which may require multiple software …
piece of software. I investigate complex vulnerabilities, which may require multiple software …
[PDF][PDF] Investigating Threats to ICS and SCADA Systems Via Honeypot Data Analysis and SIEM
T ud Din, U Zia, LH Mahnoor, SMAU Hafee - 2024 - researchgate.net
Supervisory control and data acquisition (SCADA) systems are considered a type of
industrial control system that allows users to monitor, acquire data from, and control …
industrial control system that allows users to monitor, acquire data from, and control …