International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Reviewer Referral Program
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 6 Issue 6
November-December 2024
Indexing Partners
Maximizing Cyber Security Through Threat Hunting for Advanced Threat Detection and Mitigation
Author(s) | Mohammed Mustafa Khan |
---|---|
Country | USA |
Abstract | Threat hunting is the future of proactive cyber defense. It has emerged as the fundamental solution to counter sophisticated attacks. Threat hunting is not a relatively new technology. It existed in the past when security analysts utilized manual processes to examine various data to create hypotheses pertaining to possible threats using vulnerability know-how and experience to hunt threats. The advancement of threats has forced the security operational center teams to automate their hunting tools and models and to adopt the best practices to detect and mitigate advanced threats. Machine learning and artificial intelligence technologies are infused to make threat hunting more efficient and effective. To have a common ground for understanding threat hunting, a basic definition is needed. Threat hunting is the prescient effort of identifying signals of malicious activity in the IT infrastructure that have evaded underlying security controls. Threat hunting relies on the formulation of an objective-driven hypothesis and is an iterative process. Organizations strive to protect their assets and reduce possible damages. This research paper discusses threat hunting as one of the promising technologies that can help organizations proactively secure their IT infrastructure. |
Keywords | Threat hunting, threat detection, IT infrastructure |
Published In | Volume 4, Issue 3, May-June 2022 |
Published On | 2022-06-20 |
Cite This | Maximizing Cyber Security Through Threat Hunting for Advanced Threat Detection and Mitigation - Mohammed Mustafa Khan - IJFMR Volume 4, Issue 3, May-June 2022. |
Share this
E-ISSN 2582-2160
doi
CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.