A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … communications surveys & …, 2023‏ - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

Automa: Automated generation of attack hypotheses and their variants for threat hunting using knowledge discovery

B Nour, M Pourzandi, RK Qureshi… - IEEE Transactions on …, 2024‏ - ieeexplore.ieee.org
Threat hunting is a proactive security defense line exercised to uncover attacks that could
circumvent conventional detection mechanisms. It is based on an iterative approach to …

Protecting IEC 60870-5-104 ICS/SCADA systems with honeypots

E Grigoriou, A Liatifis, PR Grammatikis… - … conference on cyber …, 2022‏ - ieeexplore.ieee.org
Both signature-based and anomaly-based Intrusion Detection and Prevention System
(IDPS) have already demonstrated their efficiency towards recognising and mitigating …

AI at the Physical Layer for Wireless Network Security and Privacy

AS Abdalla*, B Tang, V Marojevic - Artificial Intelligence for …, 2025‏ - Wiley Online Library
The chapter aims to provide readers with a comprehensive understanding of AI's role in
enhancing the detection, prevention, and mitigation of network threats for safeguarding …

Strategic honeypot deployment in ultra-dense beyond 5g networks: A reinforcement learning approach

P Radoglou-Grammatikis… - … on Emerging Topics …, 2022‏ - ieeexplore.ieee.org
The progression of Software Defined Networking (SDN) and the virtualisation technologies
lead to the beyond 5G era, providing multiple benefits in the smart economies. However …

Turning the Hunted into the Hunter via Threat Hunting: Life Cycle, Ecosystem, Challenges and the Great Promise of AI

C Hillier, T Karroubi - arxiv preprint arxiv:2204.11076, 2022‏ - arxiv.org
The threat hunting lifecycle is a complex atmosphere that requires special attention from
professionals to maintain security. This paper is a collection of recent work that gives a …

Risk‐Aware SDN Defense Framework Against Anti‐Honeypot Attacks Using Safe Reinforcement Learning

D Gao, C Guo, Y Zhang, W Ji, Z Lv, Z Li… - … Journal of Network …, 2024‏ - Wiley Online Library
The development of multiple attack methods by external attackers in recent years poses a
huge challenge to the security and efficient operation of software‐defined networks (SDN) …

ThreatScout: Automated Threat Hunting Solution Using Machine Reasoning

ZM Ferdjouni, B Nour, M Pourzandi… - IEEE Security & …, 2024‏ - ieeexplore.ieee.org
In this article, we present ThreatScout, an automated threat hunting solution leveraging
machine reasoning. Our evaluation on five threat actors shows hunting rates up to 92 …

Detecting Complex Cyber Attacks Using Decoys with Online Reinforcement Learning

M Gutierrez - 2023‏ - search.proquest.com
Most vulnerabilities discovered in cybersecurity can be associated with their own singular
piece of software. I investigate complex vulnerabilities, which may require multiple software …

[PDF][PDF] Investigating Threats to ICS and SCADA Systems Via Honeypot Data Analysis and SIEM

T ud Din, U Zia, LH Mahnoor, SMAU Hafee - 2024‏ - researchgate.net
Supervisory control and data acquisition (SCADA) systems are considered a type of
industrial control system that allows users to monitor, acquire data from, and control …