“…Although existing solutions have been proposed to facilitate the threat hunting process, there are three models which are widely used in the industry. These models are the Diamond model of intrusion analysis, cyber kill chain and MITRE's Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) which can model attack behaviour and predict future threat actions [3,5,6,7]. Diamond models and the cyber kill chain model were used by some papers for threat hunting in IT and ICS networks [22,3,39].…”