IJAAS
|
|
International ADVANCED AND APPLIED SCIENCES EISSN: 2313-3724, Print ISSN: 2313-626X Frequency: 12 |
|
Volume 9, Issue 1 (January 2022), Pages: 8-19 ---------------------------------------------- Original Research Paper Title: Knowing the unknown: The hunting loop Author(s): Sultan Saud Alanazi 1, *, Adwan Alowine Alanazi 2 Affiliation(s): 1College of Computer Science and Engineering, University of Ha'il, Ha'il, Saudi Arabia * Corresponding Author. Corresponding author's ORCID profile: https://orcid.org/0000-0002-8448-5273 Digital Object Identifier: https://doi.org/10.21833/ijaas.2022.01.002 Abstract: There are several ways to improve an organization’s cybersecurity protection against intruders. One of the ways is to proactively hunt for threats, i.e., threat hunting. Threat Hunting empowers organizations to detect the presence of intruders in their environment. It identifies and searches the tactics, techniques, and procedures (TTP) of the attackers to find them in the environment. To know what to look for in the collected data and environment, it is required to know and understand the attacker's TTPs. An attacker's TTPs information usually comes from signatures, indicators, and behavior observed in threat intelligence sources. Traditionally, threat hunting involves the analysis of collected logs for Indicator of Compromise (IOCs) through different tools. However, network and security infrastructure devices generate large volumes of logs and can be challenging to analyze thus leaving gaps in the detection process. Similarly, it is very difficult to identify the required IOCs and thus sometimes makes it difficult to hunt the threat which is one of the major drawbacks of the traditional threat hunting processes and frameworks. To address this issue, intelligent automated processes using machine learning can improve the threat hunting process, that will plug those gaps before an attacker can exploit them. This paper aims to propose a machine learning-based threat-hunting model that will be able to fill the gaps in the threat detection process and effectively detect the unknown adversaries by training the machine learning algorithms via extensive datasets of TTPs and normal behavior of the system and target environment. The model is comprised of five main stages. These are Hypotheses Development, Equip, Hunt, Respond and Feedback stages. This threat hunting model is a bit ahead of the traditional models and frameworks by employing machine learning algorithms. © 2021 The Authors. Published by IASE. This is an Keywords: Threat hunting, Threat response, Threat detection, Adversary detection, TTPs, Tactics, Techniques, Procedures, Indicator of compromise, IOCs Article History: Received 14 July 2021, Received in revised form 28 October 2021, Accepted 29 October 2021 Acknowledgment No Acknowledgment. Compliance with ethical standards Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article. Citation: Alanazi SS and Alanazi AA (2022). Knowing the unknown: The hunting loop. International Journal of Advanced and Applied Sciences, 9(1): 8-19 Figures Fig. 1 Fig. 2 Fig. 3 Fig. 4 Fig. 5 Fig. 6 Fig. 7 Fig. 8 Fig. 9 Fig. 10 Fig. 11 Tables No Table ---------------------------------------------- References (13)
|