2022 IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Work 2022
DOI: 10.1109/percomworkshops53856.2022.9767375
|View full text |Cite
|
Sign up to set email alerts
|

Design and Development of Automated Threat Hunting in Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…A related contribution was made by Arafune et al [2]. They aim to predict the future steps of the attacker through threat attribution using adversarial TTs.…”
Section: A Cyber Threat Attribution and Related Topicsmentioning
confidence: 99%
See 3 more Smart Citations
“…A related contribution was made by Arafune et al [2]. They aim to predict the future steps of the attacker through threat attribution using adversarial TTs.…”
Section: A Cyber Threat Attribution and Related Topicsmentioning
confidence: 99%
“…To the best of our knowledge, no good public dataset exists for studying threat attribution 2 . Prior work has either scraped the internet [2], [5], or used labeled sandboxed malware executions [6].…”
Section: A Experiments Designmentioning
confidence: 99%
See 2 more Smart Citations
“…At the most basic level, threat hunting can simply consist of manual analysis of network or Windows logs. In contrast, [26] proposes a sophisticated threat hunting model which utilises machine learning to automatically generate threat intelligence based on data from a variety of sources.…”
Section: Data Validitymentioning
confidence: 99%