Transcription of Finding Cyber Threats with ATT&CK-Based Analytics
{{id}} {{{paragraph}}}
Finding Cyber Threats with ATT&CK -Based Analytics Blake E. Strom Joseph A. Battaglia Michael S. Kemmerer William Kupersanin Douglas P. Miller Craig Wampler Sean M. Whitley Ross D. Wolf June 2017 MTR170202 MITRE TECHNICAL REPORT Dept. No.: J83L Project No.: 0716MM09-AA The views, opinions and/or findings contained in this report are those of The MITRE Corporation and should not be construed as an official government position, policy, or decision, unless designated by other documentation. Approved for Public Release; Distribution Unlimited.
methodology can be applied to enhance enterprise network security through defensive gap analysis, endpoint security product evaluations, building and tuning behavioral analytics for a particular environment, and performing validation of defenses against a common threat model using a red team emulating known adversary behavior.
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}
Gartner's Business Analytics Framework, Analytics, Enterprise, United States Army, Risk analytics The three-minute guide, THE DEFINITIVE GUIDE TO MARKETING METRICS, Workplace safety analytics, Army Enterprise Systems Integration Program (AESIP), Army Enterprise Systems Integration Program (AESIP) Break