Understanding Threat Intelligence And Cyber Threat Hunting

  • Chintan Sandeep Kadam Research Scholar, MCA, Thakur Institute of Management Studies, Career Development & Research (TIMSCDR), Mumbai, India
  • Muskan Sandeep Jariyal Research Scholar, MCA, Thakur Institute of Management Studies, Career Development & Research (TIMSCDR), Mumbai, India

Abstract

Organizations must enhance their digital security in an era marked by continuous cyber assaults. This study dives into threat intelligence and cyber threat hunting, both of which are critical components of modern cybersecurity. This study emphasizes the vital significance of threat intelligence in proactively relating to and mollifying possible threats by explaining the definitions, types, and sources of threat intelligence, as well as the iterative process of cyber threat hunting. Furthermore, the paper investigates the significance of these practices in strengthening cybersecurity, addresses the issues that companies have during implementation, and suggests solutions to overcome these obstacles. In the face of an ever-changing threat landscape, the findings accentuate the importance of a proactive, collaborative, and adaptive strategy for cybersecurity.

References

1. Wagner TD, Mahbub K, Palomar E, Abdallah AE. Cyber threat intelligence sharing: Survey and research directions. Computers & Security. 2019 Nov 1;87:101589.
2. Conti M, Dargahi T, Dehghantanha A. Cyber threat intelligence: challenges and opportunities. Springer International Publishing; 2018.
3. Singer PW, Friedman A. Cybersecurity: What everyone needs to know. oup usa; 2014.
4. Draffin C. Cybersecurity white paper.
5. Balon T, Baggili I. Cybercompetitions: A survey of competitions, tools, and systems to support cybersecurity education. Education and Information Technologies. 2023 Sep;28(9):11759-91.
6. Aldauiji F, Batarfi O, Bayousef M. Utilizing cyber threat hunting techniques to find ransomware attacks: A survey of the state of the art. IEEE Access. 2022 Jun 8;10:61695-706.
Published
2024-05-30
How to Cite
KADAM, Chintan Sandeep; JARIYAL, Muskan Sandeep. Understanding Threat Intelligence And Cyber Threat Hunting. Journal of Advanced Research in Networking and Communication Engineering, [S.l.], v. 7, n. 1, p. 27-30, may 2024. Available at: <http://thejournalshouse.com/index.php/adr-networking-communication-eng/article/view/1111>. Date accessed: 22 oct. 2024.