Threat Hunting using GRR Rapid Response

被引:14
作者
Rasheed, Hussein [1 ]
Hadi, Ali [1 ]
Khader, Mariam [1 ]
机构
[1] Princess Sumaya Univ Technol, Dept Comp Sci, Amman, Jordan
来源
2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS) | 2017年
关键词
IoC; GRR Rapid Response; Response; Threat Hunting; Threat Intelligence;
D O I
10.1109/ICTCS.2017.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cybercrimes have evolved, and their tactics and techniques are increasingly changing with an alerting pace. This calls for a change in the mindset used to implement security measures, by adopting the approach of continuously and constantly looking for attacks that pass through the deployed security solutions. This approach of searching through the networks for any evidence on threat activity, rather waiting for a breach notification is referred to as cyber threat hunting. This paper discusses the deployment of threat hunting process using GRR Rapid Response. Two experiments were conducted, in which, both remote code execution, client side exploits are tested, and successful exploitation was used to configure a backdoor to the victim's system to achieve persistence. The experiments show that threat hunting can be achieved by the study of the monitored system's normal patterns of behavior, which will help identify the indications and thresholds that can be used in threat hunting.
引用
收藏
页码:155 / 160
页数:6
相关论文
共 50 条
  • [1] Threat Hunting for Digital Forensic Using GRR Rapid Response with NIST Framework
    Klinkhamhom, Chalerm
    Boonyopakorn, Pongsarun
    2022 37TH INTERNATIONAL TECHNICAL CONFERENCE ON CIRCUITS/SYSTEMS, COMPUTERS AND COMMUNICATIONS (ITC-CSCC 2022), 2022, : 177 - 180
  • [2] Forensic Analysis of Docker Swarm Cluster using Grr Rapid Response Framework
    Sunardi
    Riadi, Imam
    Sugandi, Andi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (02) : 459 - 466
  • [3] Methods for Automating Threat Hunting and Response
    Adedoyin, Anthony
    Teymourlouei, Haydar
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 1607 - 1612
  • [4] Data-Driven Threat Hunting Using Sysmon
    Mavroeidis, Vasileios
    Josang, Audun
    ICCSP 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, 2018, : 82 - 88
  • [5] Detecting Advanced Persistent Threat Malware Using Machine Learning-Based Threat Hunting
    Lin, Tien-Chih
    Guo, Cheng-Chung
    Yang, Chu -Sing
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 760 - 768
  • [6] Architecting threat hunting system based on the DODAF framework
    Aghamohammadpour, Ali
    Mahdipour, Ebrahim
    Attarzadeh, Iman
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (04) : 4215 - 4242
  • [7] Architecting threat hunting system based on the DODAF framework
    Ali Aghamohammadpour
    Ebrahim Mahdipour
    Iman Attarzadeh
    The Journal of Supercomputing, 2023, 79 : 4215 - 4242
  • [8] Cyber threat hunting using unsupervised federated learning and adversary emulation
    Sheikhi, Saeid
    Kostakos, Panos
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 315 - 320
  • [9] From TTP to IoC: Advanced Persistent Graphs for Threat Hunting
    Berady, Aimad
    Jaume, Mathieu
    Tong, Valerie Viet Triem
    Guette, Gilles
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2021, 18 (02): : 1321 - 1333
  • [10] A Survey on Threat Hunting in Enterprise Networks
    Nour, Boubakr
    Pourzandi, Makan
    Debbabi, Mourad
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (04): : 2299 - 2324