2021 IEEE 37th International Conference on Data Engineering (ICDE) 2021
DOI: 10.1109/icde51399.2021.00024
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

Abstract: Log-based cyber threat hunting has emerged as an important solution to counter sophisticated cyber attacks. However, existing approaches require non-trivial efforts of manual query construction and have overlooked the rich external knowledge about threat behaviors provided by open-source Cyber Threat Intelligence (OSCTI). To bridge the gap, we propose EFFHUNTER, a system that facilitates cyber threat hunting in computer systems using OSCTI. Built upon mature system auditing frameworks, EFFHUNTER provides (1) a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(28 citation statements)
references
References 15 publications
0
28
0
Order By: Relevance
“…The novel energy infrastructure offered by active buildings must provide means to enact effective threat hunting [91], digital forensics and CTI collection, where managers, analysts, cybersecurity officers and network administrators engage with anomalous behaviours to thwart cyber-attacks. The integration with smart features in sensing or tracking embedded into physical counterparts in the infrastructure will require advanced analysis mechanisms to cope with unusual surges in demand or abnormal happenstances.…”
Section: Discussionmentioning
confidence: 99%
“…The novel energy infrastructure offered by active buildings must provide means to enact effective threat hunting [91], digital forensics and CTI collection, where managers, analysts, cybersecurity officers and network administrators engage with anomalous behaviours to thwart cyber-attacks. The integration with smart features in sensing or tracking embedded into physical counterparts in the infrastructure will require advanced analysis mechanisms to cope with unusual surges in demand or abnormal happenstances.…”
Section: Discussionmentioning
confidence: 99%
“…THREATRAP-TOR's functionalities include an unsupervised NLP pipeline for unstructured data, a domain specific query language, an automated TBQL query synthesis method, and a query engine for big data [170]. The researchers explain that THREATRAPTOR has been tested using a broad set of data from attack cases and has proved to be accurate and effective [171].…”
Section: Threat Intelligence Knowledge Basesmentioning
confidence: 99%
“…Yurekten et al [20] integrated the concepts of cyber entity intelligence, network function virtualization (NFC), and business function chaining (SFC) into an automated defense system of software-defined networks, which can evaluate defense strategies based on intelligence, in which one can choose to apply one or more network-level automated defense solutions to ensure that the defense system is scalable while increasing the intensity of attack processing. Gao et al [21] proposed a pipeline technology for extracting threat intelligence in entity intelligence and the correlation between intelligence and for drawing threat behavior maps for threat discovery. Rong et al [22] collected and correlated entity intelligence related to existing network attack methods to predict the network security status of a current system and achieve effective defense against network attacks.…”
Section: Anomaly Detection Based On Network Entity Intelligencementioning
confidence: 99%