Threat Hunting using GRR Rapid Response

被引:14
作者
Rasheed, Hussein [1 ]
Hadi, Ali [1 ]
Khader, Mariam [1 ]
机构
[1] Princess Sumaya Univ Technol, Dept Comp Sci, Amman, Jordan
来源
2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS) | 2017年
关键词
IoC; GRR Rapid Response; Response; Threat Hunting; Threat Intelligence;
D O I
10.1109/ICTCS.2017.22
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cybercrimes have evolved, and their tactics and techniques are increasingly changing with an alerting pace. This calls for a change in the mindset used to implement security measures, by adopting the approach of continuously and constantly looking for attacks that pass through the deployed security solutions. This approach of searching through the networks for any evidence on threat activity, rather waiting for a breach notification is referred to as cyber threat hunting. This paper discusses the deployment of threat hunting process using GRR Rapid Response. Two experiments were conducted, in which, both remote code execution, client side exploits are tested, and successful exploitation was used to configure a backdoor to the victim's system to achieve persistence. The experiments show that threat hunting can be achieved by the study of the monitored system's normal patterns of behavior, which will help identify the indications and thresholds that can be used in threat hunting.
引用
收藏
页码:155 / 160
页数:6
相关论文
共 50 条
  • [31] A Machine Learning-Driven Threat Hunting Architecture for Protecting Critical Infrastructures
    Lozano, Mario Aragones
    Llopis, Israel Perez
    Alarcon, Alfonso Climente
    Domingo, Manuel Esteve
    2023 19TH INTERNATIONAL CONFERENCE ON THE DESIGN OF RELIABLE COMMUNICATION NETWORKS, DRCN, 2023,
  • [32] APT attack threat-hunting network model based on hypergraph Transformer
    Li Y.
    Lin Y.
    Tongxin Xuebao/Journal on Communications, 2024, 45 (02): : 106 - 114
  • [33] Lurking in the shadows: Unsupervised decoding of beaconing communication for enhanced cyber threat hunting
    Mahboubi, Arash
    Luong, Khanh
    Jarrad, Geoff
    Camtepe, Seyit
    Bewong, Michael
    Bahutair, Mohammed
    Pogrebna, Ganna
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2025, 236
  • [34] Building Machine Learning-based Threat Hunting System from Scratch
    Chen, Chung-Kuan
    Lin, Si-Chen
    Huang, Szu-Chun
    Chu, Yung-Tien
    Lei, Chin-Laung
    Huang, Chun-Ying
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2022, 3 (03):
  • [35] DeepSecure: A computational design science approach for interpretable threat hunting in cybersecurity decision making
    Kumar, Prabhat
    Javeed, Danish
    Islam, A. K. M. Najmul
    Luo, Xin
    DECISION SUPPORT SYSTEMS, 2025, 188
  • [36] A multiview learning method for malware threat hunting: windows, IoT and android as case studies
    Hamid Darabian
    Ali Dehghantanha
    Sattar Hashemi
    Mohammad Taheri
    Amin Azmoodeh
    Sajad Homayoun
    Kim-Kwang Raymond Choo
    Reza M. Parizi
    World Wide Web, 2020, 23 : 1241 - 1260
  • [37] Threat Hunting Architecture for Electric Internet of Things: Redundancy, Diversity, Dynamism and Machine Learning
    Zhan, Congcong
    Xie, Shanyi
    Kang, Yilin
    Li, Yan
    Nong, Caiyan
    Hu, Xianjun
    2024 THE 9TH INTERNATIONAL CONFERENCE ON POWER AND RENEWABLE ENERGY, ICPRE, 2024, : 1463 - 1468
  • [38] Cryptojacking Malware Hunting: A Method Based on Ensemble Learning of Hierarchical Threat Intelligence Feature
    Zheng R.
    Wang Q.-Y.
    Lin Z.-P.
    Jing R.-Q.
    Jiang Z.-W.
    Fu J.-M.
    Wang S.-W.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2022, 50 (11): : 2707 - 2715
  • [39] A multiview learning method for malware threat hunting: windows, IoT and android as case studies
    Darabian, Hamid
    Dehghantanha, Ali
    Hashemi, Sattar
    Taheri, Mohammad
    Azmoodeh, Amin
    Homayoun, Sajad
    Choo, Kim-Kwang Raymond
    Parizi, Reza M.
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2020, 23 (02): : 1241 - 1260
  • [40] BTH: Behavior-Based Structured Threat Hunting Framework to Analyze and Detect Advanced Adversaries
    Bhardwaj, Akashdeep
    Kaushik, Keshav
    Alomari, Abdullah
    Alsirhani, Amjad
    Alshahrani, Mohammed Mujib
    Bharany, Salil
    ELECTRONICS, 2022, 11 (19)