Skip navigation
Please use this identifier to cite or link to this item: https://repository.esi-sba.dz/jspui/handle/123456789/328
Title: Threat hunting methodologies: a comparative study
Authors: MAOUCHE, CHafik
MEHANNECHE, MOhamed Seddik
Keywords: Threat Hunting
Proactive Approach
Hypothesis Based Hunting
Threat Hunting Intelligence
Cyber Security
Issue Date: 2022
Abstract: Cyber attackers are getting extremely skilled at gaining unnoticed access to systems. ItŠs not uncommon for an organization to be completely oblivious to an intrusion for days, weeks, or even months. Companies canŠt just sit back and wait for an automated alert to notify them that their security has been compromised. It must actively monitor the network for potentially malicious behavior. That is why there is a shift toward a more proactive approach: threat hunting. In this thesis, we will have a look at different threat hunting methodologies and compare each aspect of them, so that companies can be able to choose the most suitable methodology to implement in their environment.*** Les cyber criminals deviennent extrêmement habiles à obtenir un accès inaperçu aux systèmes. Il nŠest pas rare quŠune organisation soit complètement inconsciente dŠune intrusion pendant des jours, des semaines, voire des mois. Une entreprise ne peut pas simplement sŠasseoir et attendre une alerte automatisée pour être informée que sa sécurité a été compromise. il doit surveiller activement le réseau pour détecter tout comportement potentiellement malveillant. A cause de ca il y a un changement vers une approche plus proactive: threat hunting. Dans cet article, nous examinerons les différentes méthodologies de threat hunting et comparerons chaque aspect dŠentre elles, aĄn que les entreprises puissent choisir la méthodologie la plus adaptée à leurs environement.
Description: Supervisor : Mr. BENDAOUD Fayssal
URI: https://repository.esi-sba.dz/jspui/handle/123456789/328
Appears in Collections:Master

Files in This Item:
File Description SizeFormat 
Master_corrected-1-1.pdf105,05 kBAdobe PDFView/Open
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.