Cyber Threat Hunting: A Cognitive Endpoint Behavior Analytic System

1Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Security and information event management (SIEM) systems require significant manual input; SIEM tools with machine learning minimize this effort but are reactive and only effective if known attack patterns are captured by the configured rules and queries. Cyber threat hunting, a proactive method of detecting cyber threats without necessarily knowing the rules or pre-defined knowledge of threats, still requires significant manual effort and is largely missing the required machine intelligence to deploy autonomous analysis. This paper proposes a novel and interactive cognitive and predictive threat-hunting prototype tool to minimize manual configuration tasks by using machine intelligence and autonomous analytical capabilities. This tool adds proactive threat-hunting capabilities by extracting unique network communication behaviors from multiple endpoints autonomously while also providing an interactive UI with minimal configuration requirements and various cognitive visualization techniques to help cyber experts quickly spot events of cyber significance from highdimensional data.

Cite

CITATION STYLE

APA

Khan, M. S., Richard, R., Molyneaux, H., Cote-Martel, D., Elango, H. J. K., Livingstone, S., … Trask, D. (2021). Cyber Threat Hunting: A Cognitive Endpoint Behavior Analytic System. International Journal of Cognitive Informatics and Natural Intelligence, 15(4). https://doi.org/10.4018/IJCINI.20211001.oa9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free