Peltola, 2025 - Google Patents
Threat Detection Analysis Using MITRE ATT&CK FrameworkPeltola, 2025
View PDF- Document ID
- 1124386733349651528
- Author
- Peltola S
- Publication year
External Links
Snippet
Modern threat landscape has been requiring more and more defensive controls from organizations which want to secure their environments. Tools like endpoint detection and response products have made monitoring of endpoints and servers easier. MITRE ATT&CK …
- 238000001514 detection method 0 title abstract description 119
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Sharma et al. | Advanced persistent threats (apt): evolution, anatomy, attribution and countermeasures | |
| US11347843B2 (en) | Asset-based security systems and methods | |
| US10230750B2 (en) | Secure computing environment | |
| Gunawan et al. | On the review and setup of security audit using Kali Linux | |
| Möller | Threats and threat intelligence | |
| Faruk et al. | Investigating novel approaches to defend software supply chain attacks | |
| Waheed et al. | Zero-Day Exploits in Cybersecurity: Case Studies and Countermeasure | |
| Rana et al. | Ransomware attacks in cyber-physical systems: countermeasure of attack vectors through automated web defenses | |
| Gür et al. | Security analysis of computer networks: Key concepts and methodologies | |
| Abo El Rob et al. | The application of MITRE ATT&CK framework in mitigating cybersecurity threats in the public sector. | |
| Alsmadi | Cyber threat analysis | |
| Sample et al. | Zta: Never trust, always verify | |
| US20240303344A1 (en) | Methods, systems, and computer readable media for breach and attack simulation | |
| Kujo | Implementing zero trust architecture for identities and endpoints with Microsoft tools | |
| Jawad et al. | Intelligent Cybersecurity Threat Management in Modern Information Technologies Systems | |
| Peltola | Threat Detection Analysis Using MITRE ATT&CK Framework | |
| Chatterjee et al. | Cloud: A Platform to Launch Stealth Attacks | |
| Morag | The threats to jupyter notebook | |
| Venkatraman | Autonomic context-dependent architecture for malware detection | |
| Sreelekshmi et al. | Unveiling Windows Security: Detecting Security Breaches Using Windows Event Logs | |
| ElTijani | Advanced Persistent Threats Targeting the Middle East: Tactics, Techniques and Recommendations for Countermeasures. | |
| Jøsang | Cybersecurity | |
| Panagiotakopoulos | Assessing open and closed EDRs | |
| Bennett et al. | Cyberspace exercises: defending against malicious cyber actors | |
| Rehan | Understanding Attacker Tactics and Framework-Aligned Defense Strategies in the Cloud Era of AI |