Abstract | ||
---|---|---|
Defenders fighting against Advanced Persistent Threats need to discover the propagation area of an adversary as quickly as possible. This discovery takes place through a phase of an incident response operation called Threat Hunting, where defenders track down attackers within the compromised network. In this article, we propose a formal model that dissects and abstracts elements of an attack, from... |
Year | DOI | Venue |
---|---|---|
2021 | 10.1109/TNSM.2021.3056999 | IEEE Transactions on Network and Service Management |
Keywords | DocType | Volume |
Sensors,IP networks,Companies,Process control,Monitoring,MIMICs,Knowledge engineering | Journal | 18 |
Issue | ISSN | Citations |
2 | 1932-4537 | 0 |
PageRank | References | Authors |
0.34 | 0 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Aimad Berady | 1 | 0 | 0.34 |
Mathieu Jaume | 2 | 39 | 7.01 |
Valerie Viet Triem Tong | 3 | 0 | 0.34 |
Gilles Guette | 4 | 74 | 7.48 |