MITRE ATT&CK: State of the Art and Way Forward

B Al-Sada, A Sadighian, G Oligeri - arXiv preprint arXiv:2308.14016, 2023 - arxiv.org
MITRE ATT&CK is a comprehensive framework of adversary tactics, techniques and
procedures based on real-world observations. It has been used as a foundation for threat …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

Analysis of cyber threat detection and emulation using mitre attack framework

P Rajesh, M Alam, M Tahernezhadi… - … on Intelligent Data …, 2022 - ieeexplore.ieee.org
With a rapid increase in Cyber-attacks, Threat hunters such as Cyber Threat Intelligence
(CTI) and their teams requires to analyze different techniques being employed by …

[图书][B] Adversarial Machine Learning: Attack Surfaces, Defence Mechanisms, Learning Theories in Artificial Intelligence

AS Chivukula, X Yang, B Liu, W Liu, W Zhou - 2023 - Springer
A significant robustness gap exists between machine intelligence and human perception
despite recent advances in deep learning. Deep learning is not provably secure. A critical …

NORIA-O: an Ontology for Anomaly Detection and Incident Management in ICT Systems

L Tailhardat, Y Chabot, R Troncy - European Semantic Web Conference, 2024 - Springer
Abstract Large-scale Information and Communications Technology (ICT) systems give rise
to difficult situations such as handling cascading failures and detecting complex malicious …

Cyber threat intelligence enabled automated attack incident response

FK Kaiser, LJ Andris, TF Tennig, JM Iser… - … Conference on Next …, 2022 - ieeexplore.ieee.org
Cyber attacks keep states, companies and individuals at bay, draining precious resources
including time, money, and reputation. Attackers thereby seem to have a first mover …

Using a collated cybersecurity dataset for machine learning and artificial intelligence

E Hemberg, UM O'Reilly - arXiv preprint arXiv:2108.02618, 2021 - arxiv.org
Artificial Intelligence (AI) and Machine Learning (ML) algorithms can support the span of
indicator-level, eg anomaly detection, to behavioral level cyber security modeling and …

Attack hypotheses generation based on threat intelligence knowledge graph

FK Kaiser, U Dardik, A Elitzur… - … on Dependable and …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence on past attacks may help with attack reconstruction and the
prediction of the course of an ongoing attack by providing deeper understanding of the tools …

Enhancements to Threat, Vulnerability, and Mitigation Knowledge for Cyber Analytics, Hunting, and Simulations

E Hemberg, MJ Turner, N Rutar… - Digital Threats: Research …, 2024 - dl.acm.org
Cross-linked threat, vulnerability, and defensive mitigation knowledge is critical in defending
against diverse and dynamic cyber threats. Cyber analysts consult it by deductively or …

Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports

MR Rahman, SK Basak, RM Hezaveh… - arXiv preprint arXiv …, 2024 - arxiv.org
Context: Cybersecurity vendors often publish cyber threat intelligence (CTI) reports, referring
to the written artifacts on technical and forensic analysis of the techniques used by the …