A Survey on Threat Hunting in Enterprise Networks

被引:14
作者
Nour, Boubakr [1 ,2 ]
Pourzandi, Makan [2 ]
Debbabi, Mourad [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Gina Cody Sch Engn & Comp Sci, Montreal, PQ H3G 1M8, Canada
[2] Ericsson, GFTL Secur Res, Montreal, PQ H4S 0B6, Canada
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2023年 / 25卷 / 04期
关键词
Security; Surveys; Threat modeling; Computer security; Tutorials; Systematics; Organizations; Cybersecurity; cyber threat intelligence; threat hunting; threat detection; INTRUSION DETECTION; ARTIFICIAL-INTELLIGENCE; SECURITY; CHALLENGES; CYBERSECURITY; FRAMEWORK; PREDICTION; ANALYTICS; INTERNET;
D O I
10.1109/COMST.2023.3299519
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in data generation and a rapid evolution of new applications that lead to new, wider, and more sophisticated threats that are complex and hard to be detected. Advanced persistence threats use continuous, clandestine, and sophisticated techniques to gain access to a system and remain hidden for a prolonged period of time, with potentially destructive consequences. Those stealthy attacks are often not detectable by advanced intrusion detection systems (e.g., LightBasin attack was detected in 2022 and has been active since 2016). Indeed, threat actors are able to quickly and intelligently alter their tactics to avoid being detected by security defense lines (e.g., prevention and detection mechanisms). In response to these evolving threats, organizations need to adopt new proactive defense approaches. Threat hunting is a proactive security line exercised to uncover stealthy attacks, malicious activities, and suspicious entities that could circumvent standard detection mechanisms. Additionally, threat hunting is an iterative approach to generate and revise threat hypotheses endeavoring to provide early attack detection in a proactive way. The proactiveness consists of testing and validating the initial hypothesis using various manual and automated tools/techniques with the objective of confirming/refuting the existence of an attack. This survey studies the threat hunting concept and provides a comprehensive review of the existing solutions for Enterprise networks. In particular, we provide a threat hunting taxonomy based on the used technique and a sub-classification based on the detailed approach. Furthermore, we discuss the existing standardization efforts. Finally, we provide a qualitative discussion on current advances and identify various research gaps and challenges that may be considered by the research community to design concrete and efficient threat hunting solutions.
引用
收藏
页码:2299 / 2324
页数:26
相关论文
共 50 条
  • [1] A Survey on Cross-Architectural IoT Malware Threat Hunting
    Raju, Anandharaju Durai
    Abualhaol, Ibrahim Y.
    Giagone, Ronnie Salvador
    Zhou, Yang
    Huang, Shengqiang
    IEEE ACCESS, 2021, 9 : 91686 - 91709
  • [2] A Threat Hunting Framework for Industrial Control Systems
    Jadidi, Zahra
    Lu, Yi
    IEEE ACCESS, 2021, 9 : 164118 - 164130
  • [3] Survey on Unified Threat Management (UTM) Systems for Home Networks
    Siddiqui, Asif
    Rimal, Bhaskar P.
    Reisslein, Martin
    Wang, Yong
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (04): : 2459 - 2509
  • [4] How Machine Learning Changes the Nature of Cyberattacks on IoT Networks: A Survey
    Bout, Emilie
    Loscri, Valeria
    Gallais, Antoine
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2022, 24 (01) : 248 - 279
  • [5] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey
    Alaeifar, Poopak
    Pal, Shantanu
    Jadidi, Zahra
    Hussain, Mukhtar
    Foo, Ernest
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
  • [6] Skade - A Challenge Management System for Cyber Threat Hunting
    Sommestad, Teodor
    Karlzen, Henrik
    Kvist, Hanna
    Gustafsson, Hanna
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, PT I, 2024, 14398 : 84 - 103
  • [7] Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles
    Lee, Jonghoon
    Kim, Jonghyun
    Kim, Ikkyun
    Han, Kijun
    IEEE ACCESS, 2019, 7 : 165607 - 165626
  • [8] Deep Learning in the Fast Lane: A Survey on Advanced Intrusion Detection Systems for Intelligent Vehicle Networks
    Almehdhar, Mohammed
    Albaseer, Abdullatif
    Khan, Muhammad Asif
    Abdallah, Mohamed
    Menouar, Hamid
    Al-Kuwari, Saif
    Al-Fuqaha, Ala
    IEEE OPEN JOURNAL OF VEHICULAR TECHNOLOGY, 2024, 5 : 869 - 906
  • [9] Methods for Automating Threat Hunting and Response
    Adedoyin, Anthony
    Teymourlouei, Haydar
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 1607 - 1612
  • [10] Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks
    Ajmal, Abdul Basit
    Alam, Masoom
    Khaliq, Awais Abdul
    Khan, Shawal
    Qadir, Zakria
    Mahmud, M. A. Parvez
    IEEE ACCESS, 2021, 9 : 126789 - 126800