Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

By 261 Downloads

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence

Log-based cyber threat hunting has emerged asan important solution to counter sophisticated attacks.However, existing approaches require non-trivial efforts of manualquery construction and have overlooked the rich external threatknowledge provided by open-source Cyber Threat Intelligence(OSCTI).

 

File Type: application/pdf
Download: 261 times
Last Updated Date: 01-15-2024