Skip navigation
Please use this identifier to cite or link to this item: https://repository.esi-sba.dz/jspui/handle/123456789/328
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMAOUCHE, CHafik-
dc.contributor.authorMEHANNECHE, MOhamed Seddik-
dc.date.accessioned2022-11-09T07:50:39Z-
dc.date.available2022-11-09T07:50:39Z-
dc.date.issued2022-
dc.identifier.urihttps://repository.esi-sba.dz/jspui/handle/123456789/328-
dc.descriptionSupervisor : Mr. BENDAOUD Fayssalen_US
dc.description.abstractCyber attackers are getting extremely skilled at gaining unnoticed access to systems. ItŠs not uncommon for an organization to be completely oblivious to an intrusion for days, weeks, or even months. Companies canŠt just sit back and wait for an automated alert to notify them that their security has been compromised. It must actively monitor the network for potentially malicious behavior. That is why there is a shift toward a more proactive approach: threat hunting. In this thesis, we will have a look at different threat hunting methodologies and compare each aspect of them, so that companies can be able to choose the most suitable methodology to implement in their environment.*** Les cyber criminals deviennent extrêmement habiles à obtenir un accès inaperçu aux systèmes. Il nŠest pas rare quŠune organisation soit complètement inconsciente dŠune intrusion pendant des jours, des semaines, voire des mois. Une entreprise ne peut pas simplement sŠasseoir et attendre une alerte automatisée pour être informée que sa sécurité a été compromise. il doit surveiller activement le réseau pour détecter tout comportement potentiellement malveillant. A cause de ca il y a un changement vers une approche plus proactive: threat hunting. Dans cet article, nous examinerons les différentes méthodologies de threat hunting et comparerons chaque aspect dŠentre elles, aĄn que les entreprises puissent choisir la méthodologie la plus adaptée à leurs environement.en_US
dc.language.isoenen_US
dc.subjectThreat Huntingen_US
dc.subjectProactive Approachen_US
dc.subjectHypothesis Based Huntingen_US
dc.subjectThreat Hunting Intelligenceen_US
dc.subjectCyber Securityen_US
dc.titleThreat hunting methodologies: a comparative studyen_US
dc.typeThesisen_US
Appears in Collections:Master

Files in This Item:
File Description SizeFormat 
Master_corrected-1-1.pdf105,05 kBAdobe PDFView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.