PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: marketing

Finding Cyber Threats with ATT&CK-Based Analytics

Finding Cyber Threats with ATT&CK -Based Analytics Blake E. Strom Joseph A. Battaglia Michael S. Kemmerer William Kupersanin Douglas P. Miller Craig Wampler Sean M. Whitley Ross D. Wolf June 2017 MTR170202 MITRE TECHNICAL REPORT Dept. No.: J83L Project No.: 0716MM09-AA The views, opinions and/or findings contained in this report are those of The MITRE Corporation and should not be construed as an official government position, policy, or decision, unless designated by other documentation. Approved for Public Release; Distribution Unlimited. Case Number 16-3713. This technical data deliverable was developed using contract funds under Basic Contract No.

tactics, techniques, and procedures (TTPs) from the ATT&CK model. MITRE’s high level research process and the behavioral detection paradigm it developed are then described in Section 2. The ATT&CK model itself is described in Section 3. Section 4 explains the process of applying ATT&CK for developing behavioral intrusion detection analytics.

Tags:

  Procedures, Technique, Tactics, And procedures

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Transcription of Finding Cyber Threats with ATT&CK-Based Analytics

Related search queries