Merging Threat Modeling with Threat Hunting for Dynamic Cybersecurity Defense

被引:0
|
作者
Nour, Boubakr [1 ]
Ujjwal, Sonika [2 ]
Karacay, Leyli [3 ]
Laaroussi, Zakaria [2 ]
Gulen, Utku [3 ]
Tomur, Emrah [4 ]
Pourzandi, Makan [1 ]
机构
[1] Ericsson Security Research, Canada
[2] Ericsson Security Research, Finland
[3] Ericsson Security Research, Turkey
[4] Izmir University of Economics, Turkey
来源
IEEE Internet of Things Magazine | 2024年 / 7卷 / 06期
关键词
D O I
10.1109/IOTM.001.2400061
中图分类号
学科分类号
摘要
As technology advances swiftly and the Internet of Things undergoes significant growth, the world is experiencing a surge in data creation. This has resulted in the rapid emergence of novel applications, bringing forth a broader range of intricate and challenging threats that pose difficulties in detection. Therefore, a comprehensive and proactive approach is needed to identify and mitigate security threats. In this article, we combine threat modeling and threat hunting using different approaches in order to provide a more holistic understanding of the security posture of the system, by leveraging the threat model capability in anticipating potential threats and the capability of the threat hunting in identifying evolving and previously unidentified threats. This integration allows for early detection and mitigation of potential threats and enables organizations to enhance their incident response readiness, implement targeted risk mitigation strategies, and fortify their overall cybersecurity posture in the face of evolving and sophisticated threats. © 2018 IEEE.
引用
收藏
页码:28 / 34
相关论文
共 50 条
  • [41] Threat hunting: assuming the worst to strengthen resilience
    Mansfield-Devine S.
    Network Security, 2017, 2017 (05) : 13 - 17
  • [42] Threat Hunting using GRR Rapid Response
    Rasheed, Hussein
    Hadi, Ali
    Khader, Mariam
    2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 155 - 160
  • [43] CTI ANT: Hunting for Chinese Threat Intelligence
    Tsai, Chia-En
    Yang, Cheng-Lin
    Chen, Chong-Kuan
    2020 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2020, : 1847 - 1852
  • [44] Dynamic Threat Processing
    Meyer, Christian
    Padmala, Srikanth
    Pessoa, Luiz
    JOURNAL OF COGNITIVE NEUROSCIENCE, 2019, 31 (04) : 522 - 542
  • [45] Network threat modeling
    Johansson, JM
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 10 - 10
  • [46] Provenance Threat Modeling
    Hambolu, Oluwakemi
    Yu, Lu
    Oakley, Jon
    Brooks, R. R.
    Mukhopadhyay, Ujan
    Skjellum, Anthony
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [47] Is China a threat? A defense industry analysis
    Ding, AS
    ISSUES & STUDIES, 2000, 36 (01): : 49 - 75
  • [48] THE THREAT HYPOTHESIS - A CONCEPTUAL AND EMPIRICAL DEFENSE
    NEIMEYER, RA
    DEATH STUDIES, 1986, 10 (02) : 177 - 190
  • [49] Upgrades increase air defense threat
    Aviat Week Space Technol (New York), 11 (55):
  • [50] Threat and Defense: From Anxiety to Approach
    Jonas, Eva
    McGregor, Ian
    Klackl, Johannes
    Agroskin, Dmitrij
    Fritsche, Immo
    Holbrook, Colin
    Nash, Kyle
    Proulx, Travis
    Quirin, Markus
    ADVANCES IN EXPERIMENTAL SOCIAL PSYCHOLOGY, VOL 49, 2014, 49 : 219 - 286