Merging Threat Modeling with Threat Hunting for Dynamic Cybersecurity Defense

被引:0
|
作者
Nour, Boubakr [1 ]
Ujjwal, Sonika [2 ]
Karacay, Leyli [3 ]
Laaroussi, Zakaria [2 ]
Gulen, Utku [3 ]
Tomur, Emrah [4 ]
Pourzandi, Makan [1 ]
机构
[1] Ericsson Security Research, Canada
[2] Ericsson Security Research, Finland
[3] Ericsson Security Research, Turkey
[4] Izmir University of Economics, Turkey
来源
IEEE Internet of Things Magazine | 2024年 / 7卷 / 06期
关键词
D O I
10.1109/IOTM.001.2400061
中图分类号
学科分类号
摘要
As technology advances swiftly and the Internet of Things undergoes significant growth, the world is experiencing a surge in data creation. This has resulted in the rapid emergence of novel applications, bringing forth a broader range of intricate and challenging threats that pose difficulties in detection. Therefore, a comprehensive and proactive approach is needed to identify and mitigate security threats. In this article, we combine threat modeling and threat hunting using different approaches in order to provide a more holistic understanding of the security posture of the system, by leveraging the threat model capability in anticipating potential threats and the capability of the threat hunting in identifying evolving and previously unidentified threats. This integration allows for early detection and mitigation of potential threats and enables organizations to enhance their incident response readiness, implement targeted risk mitigation strategies, and fortify their overall cybersecurity posture in the face of evolving and sophisticated threats. © 2018 IEEE.
引用
收藏
页码:28 / 34
相关论文
共 50 条
  • [21] Dynamic Defense Strategy against Advanced Persistent Threat with Insiders
    Hu, Pengfei
    Li, Hongxing
    Fu, Hao
    Cansever, Derya
    Mohapatra, Prasant
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [22] Beyond Static Defense: Dynamic Honeypots for Proactive Threat Engagement
    Hegedus, Daniel Laszlo
    Balogh, Adam
    Ersok, Mate
    Erdodi, Laszlo
    Olcsak, Lajos
    Banati, Anna
    18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024, 2024, : 547 - 552
  • [23] Methods for Automating Threat Hunting and Response
    Adedoyin, Anthony
    Teymourlouei, Haydar
    INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND ENERGY TECHNOLOGIES (ICECET 2021), 2021, : 1607 - 1612
  • [24] Cloud Threat Defense - a Threat Protection and Security Compliance Solution
    Bharadwaj, Deepak R.
    Bhattacharya, Anamika
    Chakkaravarthy, Manivannan
    2018 SEVENTH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING IN EMERGING MARKETS (CCEM), 2018, : 95 - 99
  • [25] A Survey on Threat Hunting in Enterprise Networks
    Nour, Boubakr
    Pourzandi, Makan
    Debbabi, Mourad
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2023, 25 (04): : 2299 - 2324
  • [26] PERCEPTION OF THREAT AND CIVIL DEFENSE
    BERLO, DK
    PUBLIC OPINION QUARTERLY, 1962, 26 (03) : 468 - 469
  • [27] THE NUCLEAR THREAT AND CIVIL DEFENSE
    BENSEN, DW
    HEALTH PHYSICS, 1983, 45 (01): : 198 - 199
  • [28] A Model for Automated Cybersecurity Threat Remediation and Sharing
    Settanni, Francesco
    Regano, Leonardo
    Basile, Cataldo
    Lioy, Antonio
    2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 492 - 497
  • [29] TIM Lecture Series The Expanding Cybersecurity Threat
    McGuire, Cheri F.
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2015, : 46 - 48
  • [30] Responding to the Escalating Cybersecurity Threat to Health Care
    Perakslis, Eric
    NEW ENGLAND JOURNAL OF MEDICINE, 2022, 387 (09): : 767 - 770