Merging Threat Modeling with Threat Hunting for Dynamic Cybersecurity Defense

被引:0
|
作者
Nour, Boubakr [1 ]
Ujjwal, Sonika [2 ]
Karacay, Leyli [3 ]
Laaroussi, Zakaria [2 ]
Gulen, Utku [3 ]
Tomur, Emrah [4 ]
Pourzandi, Makan [1 ]
机构
[1] Ericsson Security Research, Canada
[2] Ericsson Security Research, Finland
[3] Ericsson Security Research, Turkey
[4] Izmir University of Economics, Turkey
来源
IEEE Internet of Things Magazine | 2024年 / 7卷 / 06期
关键词
D O I
10.1109/IOTM.001.2400061
中图分类号
学科分类号
摘要
As technology advances swiftly and the Internet of Things undergoes significant growth, the world is experiencing a surge in data creation. This has resulted in the rapid emergence of novel applications, bringing forth a broader range of intricate and challenging threats that pose difficulties in detection. Therefore, a comprehensive and proactive approach is needed to identify and mitigate security threats. In this article, we combine threat modeling and threat hunting using different approaches in order to provide a more holistic understanding of the security posture of the system, by leveraging the threat model capability in anticipating potential threats and the capability of the threat hunting in identifying evolving and previously unidentified threats. This integration allows for early detection and mitigation of potential threats and enables organizations to enhance their incident response readiness, implement targeted risk mitigation strategies, and fortify their overall cybersecurity posture in the face of evolving and sophisticated threats. © 2018 IEEE.
引用
收藏
页码:28 / 34
相关论文
共 50 条
  • [31] Classifier Calibration: With Application to Threat Scores in Cybersecurity
    Yousef, Waleed A.
    Traore, Issa
    Briguglio, William
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 1994 - 2010
  • [32] Cybersecurity Challenges in Indonesia: Threat and Responses Analysis
    Pratiwvi, Fadhila Inas
    Hennida, Citra
    Soesilowati, Sartika
    Berliantin, Natavia
    Ekasari, Devi Yuni
    Devi, Citra Sari
    Intan, Angelique Angie
    PERSPECTIVES ON GLOBAL DEVELOPMENT AND TECHNOLOGY, 2024, 22 (3-4) : 239 - 264
  • [33] Overview of Threat Intelligence Sharing and Exchange in Cybersecurity
    Lin Y.
    Liu P.
    Wang H.
    Wang W.
    Zhang Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2052 - 2065
  • [34] Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks
    Ajmal, Abdul Basit
    Alam, Masoom
    Khaliq, Awais Abdul
    Khan, Shawal
    Qadir, Zakria
    Mahmud, M. A. Parvez
    IEEE ACCESS, 2021, 9 : 126789 - 126800
  • [35] Assessing Employees' Cybersecurity Attitude Based on Working and Cybersecurity Threat Experience
    Humaidi, Norshima
    Shahrom, Melissa
    AFRICAN JOURNAL OF INFORMATION SYSTEMS, 2023, 15 (03): : 206 - 221
  • [36] Modeling and simulation of air defense threat based on artificial potential field
    Peng, Jian-Liang
    Sun, Xiu-Xia
    Cai, Man-Yi
    Zhu, Fan
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2010, 32 (02): : 338 - 341
  • [37] From TARA to Test: Automated Automotive Cybersecurity Test Generation Out of Threat Modeling
    Marksteiner, Stefan
    Schmittner, Christoph
    Christl, Korbinian
    Nickovic, Dejan
    Sjodin, Mikael
    Sirjani, Marjan
    7TH ACM COMPUTER SCIENCE IN CARS SYMPOSIUM, CSCS 2023, 2023,
  • [38] A Threat Hunting Framework for Industrial Control Systems
    Jadidi, Zahra
    Lu, Yi
    IEEE ACCESS, 2021, 9 : 164118 - 164130
  • [39] Attack Tactic Labeling for Cyber Threat Hunting
    Lin, Sheng-Xiang
    Li, Zong-Jyun
    Chen, Tzu-Yang
    Wu, Dong-Jie
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 34 - +
  • [40] Hypothesis Generation Model for Cyber Threat Hunting
    Yi, Cheol-Gyu
    Kim, Young-Gab
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (10) : 110 - 116