Threat Hunting in Large-Scale Socs: A Cyber Threat Intelligence-Driven Model Using MITRE ATT&CK And Machine Learning

Authors

  • Tim Abdiukov NTS, Australia

Keywords:

Cyber Threat Intelligence, Threat Hunting, MITRE ATT and CK Framework, Security Operations Center (SOC), Machine Learning

Abstract

The scale of large-scale Security Operations Centers (SOCs) has led to a serious need for implementing proactive security solutions, as cyber threats have become more complex and elusive. The proposed paper introduces a unified threat hunting model that integrates Cyber Threat Intelligence (CTI), the MITRE ATT&CK framework, and Machine Learning (ML) to enhance threat detection, investigation, and response. The paper sets out with an explanation of the changing role of threat hunting in contemporary SOCs and addresses the way CTI provides contextual information to adversaries. It also discusses the structural strengths of the MITRE ATT&CK framework and demonstrates how machine learning methods can be utilized to identify patterns that cannot be observed with conventional tools. A CTI- based model is subsequently proposed, along with an explanation of its structure, development process, and enabling technologies. The practical use of the model and its benefits are illustrated in real-life case studies. At the same time, a discussion of the main challenges, including data integration and trade-offs between automation, provides the background for exploring future trends. This paper concludes that an intelligence-driven, behavior-based, and machine learning-enhanced approach to threat hunting is a critical measure to ensure that SOCs remain several steps ahead of the adversary in a rapidly evolving strategic environment.

Published

25-02-2024

How to Cite

Tim Abdiukov. (2024). Threat Hunting in Large-Scale Socs: A Cyber Threat Intelligence-Driven Model Using MITRE ATT&CK And Machine Learning. Well Testing Journal, 33, 665–678. Retrieved from https://welltestingjournal.com/index.php/WT/article/view/220

Issue

Section

Original Research Articles

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.