A Survey on Threat Hunting in Enterprise Networks

被引:14
作者
Nour, Boubakr [1 ,2 ]
Pourzandi, Makan [2 ]
Debbabi, Mourad [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Gina Cody Sch Engn & Comp Sci, Montreal, PQ H3G 1M8, Canada
[2] Ericsson, GFTL Secur Res, Montreal, PQ H4S 0B6, Canada
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2023年 / 25卷 / 04期
关键词
Security; Surveys; Threat modeling; Computer security; Tutorials; Systematics; Organizations; Cybersecurity; cyber threat intelligence; threat hunting; threat detection; INTRUSION DETECTION; ARTIFICIAL-INTELLIGENCE; SECURITY; CHALLENGES; CYBERSECURITY; FRAMEWORK; PREDICTION; ANALYTICS; INTERNET;
D O I
10.1109/COMST.2023.3299519
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in data generation and a rapid evolution of new applications that lead to new, wider, and more sophisticated threats that are complex and hard to be detected. Advanced persistence threats use continuous, clandestine, and sophisticated techniques to gain access to a system and remain hidden for a prolonged period of time, with potentially destructive consequences. Those stealthy attacks are often not detectable by advanced intrusion detection systems (e.g., LightBasin attack was detected in 2022 and has been active since 2016). Indeed, threat actors are able to quickly and intelligently alter their tactics to avoid being detected by security defense lines (e.g., prevention and detection mechanisms). In response to these evolving threats, organizations need to adopt new proactive defense approaches. Threat hunting is a proactive security line exercised to uncover stealthy attacks, malicious activities, and suspicious entities that could circumvent standard detection mechanisms. Additionally, threat hunting is an iterative approach to generate and revise threat hypotheses endeavoring to provide early attack detection in a proactive way. The proactiveness consists of testing and validating the initial hypothesis using various manual and automated tools/techniques with the objective of confirming/refuting the existence of an attack. This survey studies the threat hunting concept and provides a comprehensive review of the existing solutions for Enterprise networks. In particular, we provide a threat hunting taxonomy based on the used technique and a sub-classification based on the detailed approach. Furthermore, we discuss the existing standardization efforts. Finally, we provide a qualitative discussion on current advances and identify various research gaps and challenges that may be considered by the research community to design concrete and efficient threat hunting solutions.
引用
收藏
页码:2299 / 2324
页数:26
相关论文
共 50 条
  • [21] Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC)
    Kayhan, Varol O.
    Agrawal, Manish
    Shivendu, Shivendu
    DECISION SUPPORT SYSTEMS, 2023, 168
  • [22] Accurate threat hunting in industrial internet of things edge devices
    Yazdinejad, Abbas
    Zolfaghari, Behrouz
    Dehghantanha, Ali
    Karimipour, Hadis
    Srivastava, Gautam
    Parizi, Reza M.
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (05) : 1123 - 1130
  • [23] Citadel: Cyber threat intelligence assisted defense system for software-defined networks
    Yurekten, Ozgur
    Demirci, Mehmet
    COMPUTER NETWORKS, 2021, 191
  • [24] A survey on neural networks for (cyber-) security and (cyber-) security of neural networks
    Pawlicki, Marek
    Kozik, Rafal
    Choras, Michal
    NEUROCOMPUTING, 2022, 500 : 1075 - 1087
  • [25] A Survey of Deep Learning Techniques for Cybersecurity in Mobile Networks
    Rodriguez, Eva
    Otero, Beatriz
    Gutierrez, Norma
    Canal, Ramon
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (03): : 1920 - 1955
  • [26] A Survey of Blockchain-based Cybersecurity for Vehicular Networks
    Wang, Xifeng
    Xu, Changqiao
    Zhou, Zan
    Yang, Shujie
    Sun, Limin
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 740 - 745
  • [27] Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks
    Ferrag, Mohamed Amine
    Debbah, Merouane
    Al-Hawawreh, Muna
    2023 IEEE/ACM 23RD INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING WORKSHOPS, CCGRIDW, 2023, : 16 - 25
  • [28] Explainable artificial intelligence envisioned security mechanism for cyber threat hunting
    Kumar, Pankaj
    Wazid, Mohammad
    Singh, D. P.
    Singh, Jaskaran
    Das, Ashok Kumar
    Park, Youngho
    Rodrigues, Joel J. P. C.
    SECURITY AND PRIVACY, 2023, 6 (06)
  • [29] A Survey on Machine Learning-Based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
    Boualouache, Abdelwahab
    Engel, Thomas
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (02): : 1128 - 1172
  • [30] Securing Public Safety Communications on Commercial and Tactical 5G Networks: A Survey and Future Research Directions
    Suomalainen, Jani
    Julku, Jukka
    Vehkapera, Mikko
    Posti, Harri
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2021, 2 : 1590 - 1615