Threat Hunting using GRR Rapid Response

被引:14
作者
Rasheed, Hussein [1 ]
Hadi, Ali [1 ]
Khader, Mariam [1 ]
机构
[1] Princess Sumaya Univ Technol, Dept Comp Sci, Amman, Jordan
来源
2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS) | 2017年
关键词
IoC; GRR Rapid Response; Response; Threat Hunting; Threat Intelligence;
D O I
10.1109/ICTCS.2017.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cybercrimes have evolved, and their tactics and techniques are increasingly changing with an alerting pace. This calls for a change in the mindset used to implement security measures, by adopting the approach of continuously and constantly looking for attacks that pass through the deployed security solutions. This approach of searching through the networks for any evidence on threat activity, rather waiting for a breach notification is referred to as cyber threat hunting. This paper discusses the deployment of threat hunting process using GRR Rapid Response. Two experiments were conducted, in which, both remote code execution, client side exploits are tested, and successful exploitation was used to configure a backdoor to the victim's system to achieve persistence. The experiments show that threat hunting can be achieved by the study of the monitored system's normal patterns of behavior, which will help identify the indications and thresholds that can be used in threat hunting.
引用
收藏
页码:155 / 160
页数:6
相关论文
共 50 条
  • [21] Cyber Threat Hunting Through Automated Hypothesis and Multi-Criteria Decision Making
    Horta Neto, Antonio Jose
    Pereira dos Santos, Anderson Fernandes
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 1823 - 1830
  • [22] Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC)
    Kayhan, Varol O.
    Agrawal, Manish
    Shivendu, Shivendu
    DECISION SUPPORT SYSTEMS, 2023, 168
  • [23] Accurate threat hunting in industrial internet of things edge devices
    Yazdinejad, Abbas
    Zolfaghari, Behrouz
    Dehghantanha, Ali
    Karimipour, Hadis
    Srivastava, Gautam
    Parizi, Reza M.
    DIGITAL COMMUNICATIONS AND NETWORKS, 2023, 9 (05) : 1123 - 1130
  • [24] A Machine Learning Approach to Threat Hunting in Malicious PDF Files
    Teymourlouei, Haydar
    Harris, Vareva E.
    2023 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE, CSCI 2023, 2023, : 782 - 787
  • [25] Design and Development of Automated Threat Hunting in Industrial Control Systems
    Arafune, Masumi
    Rajalakshmi, Sidharth
    Jaldon, Luigi
    Jadidi, Zahra
    Pal, Shantanu
    Foo, Ernest
    Venkatachalam, Nagarajan
    2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
  • [26] Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon
    Chetwyn, Robert
    Eian, Martin
    Josang, Audun
    PROCEEDINGS OF THE 2024 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2024, 2024, : 95 - 104
  • [27] Enhancements to Threat, Vulnerability, and Mitigation Knowledge for Cyber Analytics, Hunting, and Simulations
    Hemberg, Erik
    Turner, Matthew J.
    Rutar, Nick
    O'Reilly, Una-May
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (01):
  • [28] ACCURIFY: Automated New Testflows Generation for Attack Variants in Threat Hunting
    Nour, Boubakr
    Pourzandi, Makan
    Qureshi, Rushaan Kamran
    Debbabi, Mourad
    FOUNDATIONS AND PRACTICE OF SECURITY, PT II, FPS 2023, 2024, 14552 : 52 - 69
  • [29] Offensive Security: Towards Proactive Threat Hunting via Adversary Emulation
    Ajmal, Abdul Basit
    Shah, Munam Ali
    Maple, Carsten
    Asghar, Muhammad Nabeel
    Ul Islam, Saif
    IEEE ACCESS, 2021, 9 : 126023 - 126033
  • [30] Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform
    Elmisery, Ahmed M.
    Sertovic, Mirela
    Qasem, Mamoun
    SERVICE-ORIENTED COMPUTING, ICSOC 2020, 2021, 12632 : 627 - 641