Transcription of Finding Cyber Threats with ATT&CK-Based Analytics
{{id}} {{{paragraph}}}
Finding Cyber Threats with ATT&CK -Based Analytics Blake E. Strom Joseph A. Battaglia Michael S. Kemmerer William Kupersanin Douglas P. Miller Craig Wampler Sean M. Whitley Ross D. Wolf June 2017 MTR170202 MITRE TECHNICAL REPORT Dept. No.: J83L Project No.: 0716MM09-AA The views, opinions and/or findings contained in this report are those of The MITRE Corporation and should not be construed as an official government position, policy, or decision, unless designated by other documentation. Approved for Public Release; Distribution Unlimited. Case Number 16-3713. This technical data deliverable was developed using contract funds under Basic Contract No.
tactics, techniques, and procedures (TTPs) from the ATT&CK model. MITRE’s high level research process and the behavioral detection paradigm it developed are then described in Section 2. The ATT&CK model itself is described in Section 3. Section 4 explains the process of applying ATT&CK for developing behavioral intrusion detection analytics.
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}