A Survey on Threat Hunting in Enterprise Networks

被引:14
作者
Nour, Boubakr [1 ,2 ]
Pourzandi, Makan [2 ]
Debbabi, Mourad [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Gina Cody Sch Engn & Comp Sci, Montreal, PQ H3G 1M8, Canada
[2] Ericsson, GFTL Secur Res, Montreal, PQ H4S 0B6, Canada
来源
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS | 2023年 / 25卷 / 04期
关键词
Security; Surveys; Threat modeling; Computer security; Tutorials; Systematics; Organizations; Cybersecurity; cyber threat intelligence; threat hunting; threat detection; INTRUSION DETECTION; ARTIFICIAL-INTELLIGENCE; SECURITY; CHALLENGES; CYBERSECURITY; FRAMEWORK; PREDICTION; ANALYTICS; INTERNET;
D O I
10.1109/COMST.2023.3299519
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in data generation and a rapid evolution of new applications that lead to new, wider, and more sophisticated threats that are complex and hard to be detected. Advanced persistence threats use continuous, clandestine, and sophisticated techniques to gain access to a system and remain hidden for a prolonged period of time, with potentially destructive consequences. Those stealthy attacks are often not detectable by advanced intrusion detection systems (e.g., LightBasin attack was detected in 2022 and has been active since 2016). Indeed, threat actors are able to quickly and intelligently alter their tactics to avoid being detected by security defense lines (e.g., prevention and detection mechanisms). In response to these evolving threats, organizations need to adopt new proactive defense approaches. Threat hunting is a proactive security line exercised to uncover stealthy attacks, malicious activities, and suspicious entities that could circumvent standard detection mechanisms. Additionally, threat hunting is an iterative approach to generate and revise threat hypotheses endeavoring to provide early attack detection in a proactive way. The proactiveness consists of testing and validating the initial hypothesis using various manual and automated tools/techniques with the objective of confirming/refuting the existence of an attack. This survey studies the threat hunting concept and provides a comprehensive review of the existing solutions for Enterprise networks. In particular, we provide a threat hunting taxonomy based on the used technique and a sub-classification based on the detailed approach. Furthermore, we discuss the existing standardization efforts. Finally, we provide a qualitative discussion on current advances and identify various research gaps and challenges that may be considered by the research community to design concrete and efficient threat hunting solutions.
引用
收藏
页码:2299 / 2324
页数:26
相关论文
共 50 条
  • [41] Architecting threat hunting system based on the DODAF framework
    Aghamohammadpour, Ali
    Mahdipour, Ebrahim
    Attarzadeh, Iman
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (04) : 4215 - 4242
  • [42] Revolutionizing Future Connectivity: A Contemporary Survey on AI-Empowered Satellite-Based Non-Terrestrial Networks in 6G
    Mahboob, Shadab
    Liu, Lingjia
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (02): : 1279 - 1321
  • [43] Evolving techniques in cyber threat hunting: A systematic review
    Mahboubi, Arash
    Luong, Khanh
    Aboutorab, Hamed
    Bui, Hang Thanh
    Jarrad, Geoff
    Bahutair, Mohammed
    Camtepe, Seyit
    Pogrebna, Ganna
    Ahmed, Ejaz
    Barry, Bazara
    Gately, Hannah
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2024, 232
  • [44] A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
    Arshad, Akashah
    Hanapi, Zurina Mohd
    Subramaniam, Shamala
    Latip, Rohaya
    PEERJ COMPUTER SCIENCE, 2021, 7 : 1 - 33
  • [45] Machine-Generated Text: A Comprehensive Survey of Threat Models and Detection Methods
    Crothers, Evan N.
    Japkowicz, Nathalie
    Viktor, Herna L.
    IEEE ACCESS, 2023, 11 : 70977 - 71002
  • [46] Data-Driven Threat Hunting Using Sysmon
    Mavroeidis, Vasileios
    Josang, Audun
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 82 - 88
  • [47] Architecting threat hunting system based on the DODAF framework
    Ali Aghamohammadpour
    Ebrahim Mahdipour
    Iman Attarzadeh
    The Journal of Supercomputing, 2023, 79 : 4215 - 4242
  • [48] Comprehensive survey of UAVs communication networks
    Hentati, Aicha Idriss
    Fourati, Lamia Chaari
    COMPUTER STANDARDS & INTERFACES, 2020, 72 (72)
  • [49] Threat Hunting Architecture for Electric Internet of Things: Redundancy, Diversity, Dynamism and Machine Learning
    Zhan, Congcong
    Xie, Shanyi
    Kang, Yilin
    Li, Yan
    Nong, Caiyan
    Hu, Xianjun
    2024 THE 9TH INTERNATIONAL CONFERENCE ON POWER AND RENEWABLE ENERGY, ICPRE, 2024, : 1463 - 1468
  • [50] DeepSecure: A computational design science approach for interpretable threat hunting in cybersecurity decision making
    Kumar, Prabhat
    Javeed, Danish
    Islam, A. K. M. Najmul
    Luo, Xin
    DECISION SUPPORT SYSTEMS, 2025, 188