Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
By IoT Security Institute 261 Downloads

Log-based cyber threat hunting has emerged asan important solution to counter sophisticated attacks.However, existing approaches require non-trivial efforts of manualquery construction and have overlooked the rich external threatknowledge provided by open-source Cyber Threat Intelligence(OSCTI).
File Type: | application/pdf |
Download: | 261 times |
Last Updated Date: | 01-15-2024 |