Merging Threat Modeling with Threat Hunting for Dynamic Cybersecurity Defense

被引:0
|
作者
Nour, Boubakr [1 ]
Ujjwal, Sonika [2 ]
Karacay, Leyli [3 ]
Laaroussi, Zakaria [2 ]
Gulen, Utku [3 ]
Tomur, Emrah [4 ]
Pourzandi, Makan [1 ]
机构
[1] Ericsson Security Research, Canada
[2] Ericsson Security Research, Finland
[3] Ericsson Security Research, Turkey
[4] Izmir University of Economics, Turkey
来源
IEEE Internet of Things Magazine | 2024年 / 7卷 / 06期
关键词
D O I
10.1109/IOTM.001.2400061
中图分类号
学科分类号
摘要
As technology advances swiftly and the Internet of Things undergoes significant growth, the world is experiencing a surge in data creation. This has resulted in the rapid emergence of novel applications, bringing forth a broader range of intricate and challenging threats that pose difficulties in detection. Therefore, a comprehensive and proactive approach is needed to identify and mitigate security threats. In this article, we combine threat modeling and threat hunting using different approaches in order to provide a more holistic understanding of the security posture of the system, by leveraging the threat model capability in anticipating potential threats and the capability of the threat hunting in identifying evolving and previously unidentified threats. This integration allows for early detection and mitigation of potential threats and enables organizations to enhance their incident response readiness, implement targeted risk mitigation strategies, and fortify their overall cybersecurity posture in the face of evolving and sophisticated threats. © 2018 IEEE.
引用
收藏
页码:28 / 34
相关论文
共 50 条
  • [11] A framework for effective threat hunting
    Bhardwaj A.
    Goundar S.
    Network Security, 2019, 2019 (06): : 15 - 19
  • [12] Bushmeat Hunting As Climate Threat
    Brodie, Jedediah F.
    Gibbs, Holly K.
    SCIENCE, 2009, 326 (5951) : 364 - 365
  • [13] A THEORY OF THREAT AND DEFENSE
    HOGAN, RA
    JOURNAL OF CONSULTING PSYCHOLOGY, 1952, 16 (06): : 417 - 424
  • [14] Systematic literature review of threat modeling and risk assessment in ship cybersecurity
    Erbas, Muhammed
    Khalil, Shaymaa Mamdouh
    Tsiopoulos, Leonidas
    OCEAN ENGINEERING, 2024, 306
  • [15] Cybersecurity: Revisiting the definition of insider threat
    Beebe, Nicole Lang
    Chang, Frederick R.
    Bridge, 1600, 49 (03): : 12 - 19
  • [16] Wearables and Cybersecurity: Navigating the Threat Landscape
    Hora, Ayushi
    Kulkarni, Prasanna
    2ND INTERNATIONAL CONFERENCE ON SUSTAINABLE COMPUTING AND SMART SYSTEMS, ICSCSS 2024, 2024, : 563 - 567
  • [17] The growing threat of cybersecurity attacks in sports
    Jenkins, Stephanie
    Evans, Nathaniel
    CYBER SENSING 2018, 2018, 10630
  • [18] Processing tweets for cybersecurity threat awareness
    Alves, Fernando
    Bettini, Aurelien
    Ferreira, Pedro M.
    Bessani, Alysson
    INFORMATION SYSTEMS, 2021, 95
  • [19] Cybersecurity: A Real Threat to Patient Safety
    Ross, Jacqueline
    JOURNAL OF PERIANESTHESIA NURSING, 2017, 32 (04) : 370 - 372
  • [20] Validation of Cybersecurity Framework for Threat Mitigation
    Llanten-Lucio, Yeison-Isaac
    Amador-Donado, Siler
    Marceles-Villalba, Katerine
    REVISTA FACULTAD DE INGENIERIA, UNIVERSIDAD PEDAGOGICA Y TECNOLOGICA DE COLOMBIA, 2022, 31 (62):