[go: up one dir, main page]

Peltola, 2025 - Google Patents

Threat Detection Analysis Using MITRE ATT&CK Framework

Peltola, 2025

View PDF
Document ID
1124386733349651528
Author
Peltola S
Publication year

External Links

Snippet

Modern threat landscape has been requiring more and more defensive controls from organizations which want to secure their environments. Tools like endpoint detection and response products have made monitoring of endpoints and servers easier. MITRE ATT&CK …
Continue reading at www.theseus.fi (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation

Similar Documents

Publication Publication Date Title
Sharma et al. Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures
US11347843B2 (en) Asset-based security systems and methods
US10230750B2 (en) Secure computing environment
Gunawan et al. On the review and setup of security audit using Kali Linux
Möller Threats and threat intelligence
Faruk et al. Investigating novel approaches to defend software supply chain attacks
Waheed et al. Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure
Rana et al. Ransomware attacks in cyber-physical systems: countermeasure of attack vectors through automated web defenses
Gür et al. Security analysis of computer networks: Key concepts and methodologies
Abo El Rob et al. The application of MITRE ATT&CK framework in mitigating cybersecurity threats in the public sector.
Alsmadi Cyber threat analysis
Sample et al. Zta: Never trust, always verify
US20240303344A1 (en) Methods, systems, and computer readable media for breach and attack simulation
Kujo Implementing zero trust architecture for identities and endpoints with Microsoft tools
Jawad et al. Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems
Peltola Threat Detection Analysis Using MITRE ATT&CK Framework
Chatterjee et al. Cloud: A Platform to Launch Stealth Attacks
Morag The threats to jupyter notebook
Venkatraman Autonomic context-dependent architecture for malware detection
Sreelekshmi et al. Unveiling Windows Security: Detecting Security Breaches Using Windows Event Logs
ElTijani Advanced Persistent Threats Targeting the Middle East: Tactics, Techniques and Recommendations for Countermeasures.
Jøsang Cybersecurity
Panagiotakopoulos Assessing open and closed EDRs
Bennett et al. Cyberspace exercises: defending against malicious cyber actors
Rehan Understanding Attacker Tactics and Framework-Aligned Defense Strategies in the Cloud Era of AI