2017 International Conference on New Trends in Computing Sciences (ICTCS) 2017
DOI: 10.1109/ictcs.2017.22
|View full text |Cite
|
Sign up to set email alerts
|

Threat Hunting Using GRR Rapid Response

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 1 publication
0
9
0
1
Order By: Relevance
“…Reference [12] created memory corruption and persistent attacks using Metasploit on GRR clients and responded to them using GRR's hunt functionality (i.e., GRRScanMemoryHunt, NetworkStatusHunt, GRRRegistryFinderHunt). Using GRR's cronjob, hunt tasks were scheduled, and memory, network status, and Windows registry-key analysis were performed, resulting in a welldocumented analysis of the limitations of slow detection caused by the hunt cycle taking a long time (~5-10 min).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Reference [12] created memory corruption and persistent attacks using Metasploit on GRR clients and responded to them using GRR's hunt functionality (i.e., GRRScanMemoryHunt, NetworkStatusHunt, GRRRegistryFinderHunt). Using GRR's cronjob, hunt tasks were scheduled, and memory, network status, and Windows registry-key analysis were performed, resulting in a welldocumented analysis of the limitations of slow detection caused by the hunt cycle taking a long time (~5-10 min).…”
Section: Related Workmentioning
confidence: 99%
“…This way, the GRR can resolve resource-hogging issues. Flows can be done on thousands of Contribution Limitation [12] Responded to memory corruption and persistent attacks using GRR hunt functionality.…”
Section: A Grrmentioning
confidence: 99%
“…The research in [25] discussed about using Grr Rapid Response on hunting threat activities on computer networks before an accident happen. The experiment is carried out by exploiting the client's remote code by configuring the rear door of the victim system.…”
Section: B Grr Rapid Response Frameworkmentioning
confidence: 99%
“…Client GRR secara periodik akan melakukan request pada server frontend Grr untuk menjalankan sebuah aksi tertentu berupa flows. Server Grr merupakan infrastruktur yang terdiri dari komponen Frontend, Worker, Server UI dengan antarmuka berbasis Web, dan sebuah endpoint Application Programming Interface (API) yang memungkinkan investigator forensik untuk dapat menjadwalkan aksi-aksi yang ingin dijalankan oleh client Grr untuk menampilkan dan melakukan pemrosesan terhadap artefak digital yang dikumpulkan (Rasheed, Hadi, & Khader, 2017). Grr dapat bekerja secara berskala sehingga investigator forensik dapat secara efektif melakukan akuisisi dan pemrosesan data yang berasal dari banyak komputer atau client Grr.…”
Section: Gambar 1 Frekuensi Serangan Komputer 12 Bulan Terakhirunclassified