DC Field | Value | Language |
dc.contributor.author | MAOUCHE, CHafik | - |
dc.contributor.author | MEHANNECHE, MOhamed Seddik | - |
dc.date.accessioned | 2022-11-09T07:50:39Z | - |
dc.date.available | 2022-11-09T07:50:39Z | - |
dc.date.issued | 2022 | - |
dc.identifier.uri | https://repository.esi-sba.dz/jspui/handle/123456789/328 | - |
dc.description | Supervisor : Mr. BENDAOUD Fayssal | en_US |
dc.description.abstract | Cyber attackers are getting extremely skilled at gaining unnoticed access to systems. ItŠs
not uncommon for an organization to be completely oblivious to an intrusion for days, weeks,
or even months.
Companies canŠt just sit back and wait for an automated alert to notify them that their
security has been compromised. It must actively monitor the network for potentially malicious
behavior. That is why there is a shift toward a more proactive approach: threat hunting.
In this thesis, we will have a look at different threat hunting methodologies and compare
each aspect of them, so that companies can be able to choose the most suitable methodology
to implement in their environment.***
Les cyber criminals deviennent extrêmement habiles à obtenir un accès inaperçu aux systèmes.
Il nŠest pas rare quŠune organisation soit complètement inconsciente dŠune intrusion pendant
des jours, des semaines, voire des mois.
Une entreprise ne peut pas simplement sŠasseoir et attendre une alerte automatisée pour
être informée que sa sécurité a été compromise. il doit surveiller activement le réseau pour
détecter tout comportement potentiellement malveillant. A cause de ca il y a un changement
vers une approche plus proactive: threat hunting.
Dans cet article, nous examinerons les différentes méthodologies de threat hunting et comparerons
chaque aspect dŠentre elles, aĄn que les entreprises puissent choisir la méthodologie la
plus adaptée à leurs environement. | en_US |
dc.language.iso | en | en_US |
dc.subject | Threat Hunting | en_US |
dc.subject | Proactive Approach | en_US |
dc.subject | Hypothesis Based Hunting | en_US |
dc.subject | Threat Hunting Intelligence | en_US |
dc.subject | Cyber Security | en_US |
dc.title | Threat hunting methodologies: a comparative study | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Master
|