Visible to the public Data-Driven Threat Hunting Using Sysmon

TitleData-Driven Threat Hunting Using Sysmon
Publication TypeConference Paper
Year of Publication2018
AuthorsMavroeidis, Vasileios, Jøsang, Audun
Conference NameProceedings of the 2Nd International Conference on Cryptography, Security and Privacy
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6361-7
Keywordsartificial intelligence security, composability, cyber threat intelligence, Human Behavior, Metrics, pubcrawl, Resiliency, sysmon, Threat Assessment, threat hunting
AbstractThreat actors can be persistent, motivated and agile, and they leverage a diversified and extensive set of tactics, techniques, and procedures to attain their goals. In response to that, organizations establish threat intelligence programs to improve their defense capabilities and mitigate risk. Actionable threat intelligence is integrated into security information and event management systems (SIEM) forming a threat intelligence platform. A threat intelligence platform aggregates log data from multiple disparate sources by deploying numerous collection agents and provides centralized analysis and reporting of an organization's security events for identifying malicious activity. Sysmon logs is a data source that has received considerable attention for endpoint visibility. Approaches for threat detection using Sysmon have been proposed mainly focusing on search engines (NoSQL database systems). This paper presents a new automated threat assessment system that relies on the analysis of continuous incoming feeds of Sysmon logs. The system is based on a cyber threat intelligence ontology and analyses Sysmon logs to classify software in different threat levels and augment cyber defensive capabilities through situational awareness, prediction, and automated courses of action.
DOI10.1145/3199478.3199490
Citation Keymavroeidis_data-driven_2018