A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review

A Mahboubi, K Luong, H Aboutorab, HT Bui… - Journal of Network and …, 2024 - Elsevier
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …

Euler: Detecting Network Lateral Movement via Scalable Temporal Link Prediction

IJ King, HH Huang - ACM Transactions on Privacy and Security, 2023 - dl.acm.org
Lateral movement is a key stage of system compromise used by advanced persistent
threats. Detecting it is no simple task. When network host logs are abstracted into discrete …

Gazeta: Game-theoretic zero-trust authentication for defense against lateral movement in 5g iot networks

Y Ge, Q Zhu - IEEE Transactions on Information Forensics and …, 2023 - ieeexplore.ieee.org
The increasing connectivity in the 5G Internet of Things networks has enlarged the attack
surface and made the traditional security defense inadequate for sophisticated attackers …

Hopper: Modeling and detecting lateral movement

G Ho, M Dhiman, D Akhawe, V Paxson… - 30th USENIX Security …, 2021 - usenix.org
In successful enterprise attacks, adversaries often need to gain access to additional
machines beyond their initial point of compromise, a set of internal movements known as …

On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from sysmon logs

C Smiliotopoulos, G Kambourakis… - International Journal of …, 2023 - Springer
Lateral movement (LM) is a principal, increasingly common, tactic in the arsenal of
advanced persistent threat (APT) groups and other less or more powerful threat actors. It …

LMTracker: Lateral movement path detection based on heterogeneous graph embedding

Y Fang, C Wang, Z Fang, C Huang - Neurocomputing, 2022 - Elsevier
Abstract Advanced Persistent Threats (APT) with the purpose of stealing confidential data
take place all the time. In the APT life cycle, lateral movement is a critical stage towards high …

Uncovering lateral movement using authentication logs

H Bian, T Bai, MA Salahuddin, N Limam… - … on Network and …, 2021 - ieeexplore.ieee.org
Network infiltrations due to advanced persistent threats (APTs) have significantly grown in
recent years. Their primary objective is to gain unauthorized access to network assets …

Generating attack graphs in agile security platforms

A Hassanzadeh, A Nayak, MDS Ullah - US Patent 11,277,432, 2022 - Google Patents
Primary Examiner Don G Zhao (74) Attorney, Agent, or Firm-Fish & Richardson PC (57)
ABSTRACT Implementations of the present disclosure include providing a state graph …

Generating attack graphs in agile security platforms

E Hadar, A Hassanzadeh, D Grabois… - US Patent 11,184,385, 2021 - Google Patents
Implementations of the present disclosure include providing a graph that is representative of
an enterprise network and includes nodes and edges, a set of nodes representing assets …