https://repository.esi-sba.dz/jspui/handle/123456789/328
Title: | Threat hunting methodologies: a comparative study |
Authors: | MAOUCHE, CHafik MEHANNECHE, MOhamed Seddik |
Keywords: | Threat Hunting Proactive Approach Hypothesis Based Hunting Threat Hunting Intelligence Cyber Security |
Issue Date: | 2022 |
Abstract: | Cyber attackers are getting extremely skilled at gaining unnoticed access to systems. ItŠs not uncommon for an organization to be completely oblivious to an intrusion for days, weeks, or even months. Companies canŠt just sit back and wait for an automated alert to notify them that their security has been compromised. It must actively monitor the network for potentially malicious behavior. That is why there is a shift toward a more proactive approach: threat hunting. In this thesis, we will have a look at different threat hunting methodologies and compare each aspect of them, so that companies can be able to choose the most suitable methodology to implement in their environment.*** Les cyber criminals deviennent extrêmement habiles à obtenir un accès inaperçu aux systèmes. Il nŠest pas rare quŠune organisation soit complètement inconsciente dŠune intrusion pendant des jours, des semaines, voire des mois. Une entreprise ne peut pas simplement sŠasseoir et attendre une alerte automatisée pour être informée que sa sécurité a été compromise. il doit surveiller activement le réseau pour détecter tout comportement potentiellement malveillant. A cause de ca il y a un changement vers une approche plus proactive: threat hunting. Dans cet article, nous examinerons les différentes méthodologies de threat hunting et comparerons chaque aspect dŠentre elles, aĄn que les entreprises puissent choisir la méthodologie la plus adaptée à leurs environement. |
Description: | Supervisor : Mr. BENDAOUD Fayssal |
URI: | https://repository.esi-sba.dz/jspui/handle/123456789/328 |
Appears in Collections: | Master |
File | Description | Size | Format | |
---|---|---|---|---|
Master_corrected-1-1.pdf | 105,05 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.