<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Nataliia Lukova-Chuiko</string-name>
          <email>lukova@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andriy Fesenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hanna Papirna</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergiy Gnatyuk</string-name>
          <email>s.gnatyuk@nau.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1 Liubomyr Huzar ave., Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>24 Bohdan Havrylyshyn St, Kyiv, 04116</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>103</fpage>
      <lpage>113</lpage>
      <abstract>
        <p>This paper presents the structuring of a new approach to countering cyber threats - Threat Hunting. This concept is proactive threat search, mainly a manual process with elements of automation, in which the analyst uses his knowledge and skills to check large amounts of information for indicators of compromise, according to a predetermined hypothesis of the presence of a threat. All key elements of Threat Hunting approach were explained as well as functional diagram for a deep understanding and application of this approach in practice by specialists in the field of cybersecurity was proposed in the paper. Threat Hunting, indicators of compromise, proactive cybersecurity, cyber threat.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>To date, most information security threats are known, and can be defended by traditional means of
protection such as antivirus, firewalls, and so on. Such threats include spam, denial-of-service attacks,
viruses, rootkits, and other classic malware. The remaining minority of threats are unknown and the
most dangerous. They are difficult to detect and even more so to protect against them. Examples of
such threats are encryption viruses, crypto miners, etc.</p>
      <p>In a company with organized information security management processes, the majority of the risk
of known threats can be resolved with a traditional risk management approach: avoid, accept (accept
possible financial or image losses), reduce (implement the necessary protection) or transfer (for
example, to a service provider). Instead, protecting against zero-day vulnerabilities, targeted attacks,
phishing, supply chain attacks, and a large number of other attacks is much more difficult. The
consequences of these threats will be much more serious than the consequences of spam or viruses,
from which modern anti-virus software is quite able to protect.</p>
      <p>This situation has led to the development of means of protection against cyber threats in the
direction of developing new technology that would be able to counteract the most serious and
complex threats.</p>
      <p>Proactive threat search or Threat Hunting (hereinafter – TH) is the latest way to counter
cyberattacks, which through proactive and iterative search, allows to detect complex thr eats that
traditional means of protection are not even able to notice. It should be noted that TH is not a specific
software or hardware product and is not a passive activity. Proactive threat search is, first of all,
mainly a manual process with elements of automation, in which the analyst, based on his knowledge
and skills, checks large amounts of information for indicators of compromise, according to a
predetermined hypothesis of the presence of a threat. Due to the fact that this concept is relatively new
in the field of cybersecurity, it is advisable to explain it from the opposite, that is, to describe what
this process is not in order to avoid confusion of concepts and technologies.
EMAIL:
aafesenko88@gmail.com
(A.</p>
      <p>Fesenko);</p>
      <p>
        2020 Copyright for this paper by its authors.
Thus, TH is not [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]:
 a form of penetration testing, although TH can lead to an understanding of which area of the
IT infrastructure to conduct penetration testing;
 a constant search for indicators of compromise, although they are used in the process;
 a security monitoring, although TH results can be used to provide a new detection mechanism
followed by security monitoring;
 an incident response, although THs can lead to incident disclosure, thereby initiating an
incident response process;
 a request execution in the security tool, although automation and data request are an
important part of the TH. In other words, if an information security tool (such as an antivirus,
intrusion prevention system, etc.) can run the process autonomously, it is not a proactive threat
search. TH professionals should use the tools to support their hypotheses and investigations, but
the simple use of the tool is not able to provide this process completely;
 a process that gives a guaranteed result. Not every proactive search is able to detect an
attacker or lead to the creation of new detection mechanisms. This does not necessarily mean that
there is no malicious influence. For example, the data required for the investigation may be
missing, or the compromise indicator under investigation may not have been present during the
search. However, the search will always yield some secondary result, such as a deeper
understanding of the infrastructure or the identification of missing data;
 a simple process. TH requires a deep knowledge of the information environment and an
excellent understanding of the capabilities of the attacker. Compared to traditional security
monitoring, TH is a much more challenging task.
      </p>
      <p>The aim of this paper is to study TH as a mean of protection against cyber threats in information
systems and networks with a detailed systematization of steps to obtain key factors for its successful
implementation. The authors also propose the extended functional diagram of the TH process created
by other studies in the field.</p>
    </sec>
    <sec id="sec-2">
      <title>2. The essence and purpose of Threat Hunting</title>
      <p>
        Threat Hunting is a preventive, iterative and human-oriented identification of cyber threats that are
internal to the IT network and bypass existing security measures [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>The main purpose of the TH is to reduce the time required to search for traces of attackers who
have already compromised the IT environment. By identifying these traces as soon as possible, the
impact of violations on the organization can be minimized. Gaps in the detection of violations - an
important concept in the context of this goal.</p>
      <p>Thus, there will always be a gap between what an organization can detect and the ability of a
skilled attacker to avoid detection. An attacker's capabilities will be different for each attacker, and
detection capabilities will be different for each organization. Although attackers usually have the
opportunity to avoid detection, at some point they may trigger detection mechanisms, either because
these detection mechanisms have evolved, or due to human factors.</p>
      <p>
        A good TH program aims to track the behavior of attackers and continuously reduce the gaps in
the detection of violations. In particular, the search for threats focuses on actions that may go
unnoticed. The TH focuses on events that go beyond traditional detection capabilities, and can detect
missed or misinterpreted events that can be used to improve the detection and further training of
information security analysts [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
2.1.
      </p>
    </sec>
    <sec id="sec-3">
      <title>Main Threat Hunting characteristics</title>
      <p>
        Based on the above, it is possible to derive the main characteristics of the TH [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
 Initiative nature. Threat Hunting experts are proactively looking for indicators of harmful
activity in the network, instead of waiting for signals from traditional detection mechanisms to
start an investigation.
 Finding the unknown. TH mainly focuses on known elements, however, can detect unknown;
 Assuming the possibility of a violation. Proactivity does not make sense if the information
security professional believes that prevention and detection mechanisms are sufficient to prevent
violations. The TH assumes that the violation has already taken place but has not yet been
identified.
 Understanding of the attacker. It is important to understand the motivation and thoughts of the
attacker. These are important characteristics that determine how persistent and professional an
attacker is.
 Creativity and repeatability of the process. The TH process is a creative process. The quality
of the process largely depends on the creativity, experience and knowledge of the specialist
conducting the search. It is an iterative process: the search for threats can lead to new discoveries
and new investigations; the collection of information may also lead to new assumptions about the
current TH process.
 Data driven process. Threats require a lot of data. The best sources of information for TH are
considered to be: endpoint information, firewall logs, domain name service (DNS) logs, etc. The
higher the quality of the data, the higher the probability of success of the investigation. These data
should help the specialist to study the hypotheses of TH, and not complicate the situation by
adding information noise.
 Based on hypotheses. Derivation of hypotheses and their proof play a key role in the TH
process according to any currently known methodology.
 Requires teamwork. The team of TH specialists uses a common approach and determines
what threats to look for. The team will also prioritize hypotheses based on the risk levels
associated with the threat. Typically, the skill set for working in such teams is reduced to general
knowledge in the field of information security, knowledge of the IT environment, knowledge of
analysis methods, knowledge of attacker methods and good communication skills.
2.2.
      </p>
    </sec>
    <sec id="sec-4">
      <title>Threat Hunting classification</title>
      <p>
        According to the leading American company in the field of cybersecurity and big data analytics
Sqrrl, there are five types of TH [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>The first type is TH based on data. A natural starting point for stimulating TH is to create
hypotheses based on observational data to review data that is already available. For example, proxy
logs, traffic statistics and more. Analysts can use any of the data sources as a basis for generating
hypotheses, creating queries or reports that identify abnormal behavior.</p>
      <p>The second type is TH based on data mining. Threat data and analytics can provide organizations
with ample opportunities for TH. Unfortunately, this approach is one of the most difficult because
organizations need to be aware of both the different levels of reliability of information and the
usefulness and rare nature of collecting inside information based on things like incident response.
Analysts who follow this approach can be assisted by safety graphs to obtain the context of the threat.
The graph of security behavior provides critical points of integration, processing and analysis,
allowing the analyst to effectively use information about threats to manage and enrich the activities of
the TH.</p>
      <p>The third type - entity-based TH. This type is characterized by focusing on high-risk / value
entities, such as critical intellectual property and network resources. Attackers typically target specific
assets or high-risk users in an organization (such as a domain controller or system administrator
account). More and more organizations proactively determine what kind of assets it is before the
attacker does it for them.</p>
      <p>The fourth type is TH based on tactics, techniques and procedures (hereinafter - TTP). This
approach focuses on the fact that much more important than just static indicators (domains, IP
addresses, hashes) are the methods, tactics and procedures of attackers. These observations are
excellent material for TH because they provide contextual starting points that are more suitable for
human analysis than for automatic resolution.</p>
      <p>The fifth type is a hybrid TH. In fact, any successful TH will combine combinations of the above
types. For example, TH can be formed using information about threats around a particular attacker,
which informs the analyst about the types of TTPs that can be used by him, and the critical assets that
he can target.</p>
      <p>
        There is also another more simplified approach, which divides TH into two types [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>A structured TH is a hypothesis-based TH: a hypothesis is created, the scope of the TH is
estimated, and then the TH is executed. This approach can be based on both data mining and entity
analysis, and TTP.</p>
      <p>An unstructured TH is a data-driven TH. Potentially harmful activity can be detected by an analyst
who simply looks at the available data for anomalies. This type of threat search does not start with a
hypothesis, does not follow a predetermined path and is thus considered unstructured. It should be
noted that unstructured TH requires a lot of effort and is less likely to give valuable results.
2.3.</p>
    </sec>
    <sec id="sec-5">
      <title>Threat Hunting triad</title>
      <p>
        According to a study by the leading analyst and cybersecurity expert Daniel Akacki, a successful
TH procedure contains three components [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>The first component is people, cybersecurity professionals, who have the appropriate skills. In the
above study, the following set of skills that a specialist must have to successfully conduct TH is
represented:
 analytical thinking as the specialist must be able to make reasonable assumptions and plan a
new course;
 ability to analyze the audit log of the system. Service and device logs are just a couple of the
most important and underused sources of information for any security department. The ability to
analyze logs for anomalies and switch between data sources to see the big picture is a key
competency;
 network forensics skills - the ability to read and understand the data of captured network
packets and determine the harmful nature of network traffic;
 knowledge of network architecture - understanding of different network devices and how they
work in the IT environment;
 understanding the life cycle of the attacker. Understanding the various events that occur at
any stage of the attack lifecycle prepares analysts to share and prioritize their results and actions;
 knowledge of working with information security tools is a large area, but at a basic level of
understanding how log aggregators retrieve data, as well as the functions of packet capture
analysis tools are sufficient for the analyst;
 knowledge of operating system architecture as different operating systems represent different
attack vectors;
 understanding of basic methods of attacks. Exploit kits, malware, phishing, and
misconfiguration - understanding how an attacker tries to break into a network is key to finding
indicators of compromise.</p>
      <p>The second component of the TH procedure is processes, because the goal of a mature security
process should be to automate much of the threat detection with reliable rules and timely notification
to give analysts more time to directly conduct TH.</p>
      <p>Processes should be designed taking into account the desire to understand not only what data is
already available, but also data sources that are missing or incorrectly configured, because it is
impossible to protect what is unknown.</p>
      <p>The third and final component of the TH procedure is the technology, which is described in more
detail in paragraph 4.2.1.</p>
    </sec>
    <sec id="sec-6">
      <title>3. Threat Hunting basics</title>
      <p>
        Closely related to the TH process is cyber threat intelligence - a process of collecting, processing
and analyzing information about attackers in cyberspace in order to disseminate effective information
about threats by understanding the motives, capabilities and methods of attackers to inform about
measures to reduce cybersecurity [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        For such an analysis, the indicators of compromise are used. To date, the Pyramid of Pain by
David Bianco [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] is the most popular and effective, according to leading experts in the field, model
that explains the role of indicators of compromise in the process of TH.
      </p>
      <p>This simple pyramid shows the relationship between the types of indicators that can be used to
detect an attacker and the degree of "pain" (the probability of failure) that they cause him, if experts
can prevent and prohibit the use of these indicators by an attacker.</p>
      <p>
        Indicators by their hierarchy are considered in more detail below [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>Hash values are at the lowest level of the pyramid. Most hashing algorithms calculate the message
digest for the entire input and output a fixed-length hash unique to that input. In other words, if the
contents of two files differ even by one bit, the resulting hash values of the two files will be
completely different.</p>
      <p>On the one hand, hash indicators are the most accurate type of indicator to focus on. The chances
that two different files have the same hash value are so low that it is possible to almost completely
rule out this possibility. On the other hand, any change to the file, even insignificant, such as throwing
a bit in an unused resource or adding a zero to the end, leads to a completely different and unrelated
hash value. Thus, the values of hashes are easy to change, in many cases it is not even necessary to
track them.</p>
      <p>One level above are IP addresses - the most fundamental indicator of the network. Attackers
largely need to have some network connection to carry out the attack, and the connection means IP
addresses. However, any fairly professional opponent can change IP addresses at any time convenient
for him with very little effort. In some cases, if attackers use an anonymous proxy service, they can
change IP addresses quite often without even paying attention. That is why blocking attacks based on
IP-addresses is ineffective - if you block an attacker at one IP-address, he can usually recover without
even interrupting.</p>
      <p>Further up in the pyramid are the domain names. They are a little harder to change than IP
addresses because they have to be registered, paid for and posted somewhere for them to work.
However, there are a large number of DNS providers with non-strict registration standards (many of
which are free), so in practice it is not so difficult to change the domain.</p>
      <p>In the middle of the pyramid are the artifacts of the network and the host. This is the first level at
which the ЕР specialist can begin to have a negative impact on the opponent. If it is possible to detect
indicators at this level and respond to them, the attacker will be forced to change the settings and
compilation of their tools.</p>
      <p>From a technical point of view, a network artifact can be any byte that passes through the network
as a result of an attacker's interaction. However, in practice, this means those parts of the activity that
can distinguish harmful activity from the activity of legitimate users.</p>
      <p>Host artifacts can be observations caused by the actions of attackers on one or more hosts. These
can be registry keys or values that are created by certain malicious programs, files or directories.</p>
      <p>Blocking network and / or host artifacts forces attackers to take a few steps back and spend time
figuring out how their intelligence tool was discovered and fixing it.</p>
      <p>At the penultimate level are the tools. Tools in this context are software used by an attacker to
carry out his mission. These are mostly programs that they install themselves, not software or
commands that can already be installed on a regular user's computer. Such programs include: utilities
designed to create malicious documents for targeted phishing, backdoors used to set password
crackers, etc.</p>
      <p>New generation antivirus signatures or other systems that can find variants of the same files, even
with moderate changes (communication protocols, hash values, etc.), can help detect indicators at
such a high level.</p>
      <p>At this level, it is possible to deprive the attacker of the opportunity to use one or more specific
tools. Thus, attackers will need to spend time researching (finding an existing tool with the same
capabilities), developing (creating a new tool if they have the appropriate knowledge and skills) and
learning (figuring out how to use the tool and master it). That is why blocking at the level of tools is
one of the most effective in counteracting targeted attacks.</p>
      <p>Finally, at the top are the TTPs of attackers. When detection and response occur at this level, the
action is directed directly at the behavior of the attackers, not against their tools. In terms of
efficiency, this level is the most ideal. If a specialist in TH is able to respond quickly enough to
suspicious TTP, it forces attackers to carry out the most time-consuming of the possible actions:
retraining and mastering new behavior.</p>
      <p>From the above we can conclude that the process of successful TH is to focus on the highest level
of the pyramid, the TTPs, to reduce the likelihood of achieving the goal by the attackers with the
greatest efficiency. If the attacker uses non-trivial actions or the absence of TTP data in the known
frameworks, it makes sense to lock at the lower levels of the pyramid until the TTP is detected.</p>
    </sec>
    <sec id="sec-7">
      <title>4. The order of Threat Hunting conduct</title>
      <p>
        According to the approach of the leading American company in the field of cybersecurity and big
data analytics - Sqrrl, in general, the whole process of TH can be reduced to four main stages, which
are repeated cyclically [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>The approach is called "Hunting loop" and is designed to avoid potentially inefficient TH
processes and create a formalized process. According to the Sqrrl approach, the goal of TH should be
to overcome the loop as quickly and efficiently as possible. The more efficiently iterations are
performed, the better the ability to automate new processes and move on to finding new threats.
4.1.</p>
    </sec>
    <sec id="sec-8">
      <title>Stage 1 - Hypothesis creation</title>
      <p>
        The TH process begins with asking questions about how an attacker can gain access to an
organization's network. Then these questions need to be divided into specific and measurable
hypotheses that determine what threats may be present in the network and how they can be
identified [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Hypotheses cannot be generated with the help of tools, instead they should be obtained from the
observations of a specialist based on the analysis of cyber threats, situational awareness or knowledge
of the subject area [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Hypotheses must also be tested. The TH specialists must have the necessary data visibility and
tools to find alleged evidence of malicious activity. A large variety of data types allows to explore
more methods, and more data sources expand the arena for TH. Hypotheses, as a rule, focus on
identifying a specific source of threat, tool or technique [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
4.2.
      </p>
    </sec>
    <sec id="sec-9">
      <title>Stage 2 - Research using tools and techniques</title>
      <p>Once the observations have led to the development of hypotheses, they should be tested using all
appropriate tools and methods available to TH specialists. Data visibility should be maximized by
increasing the coverage of data collection in a centralized repository, and the types of data collected
should include representative logs of organization’s major network, infrastructure and security assets.</p>
      <p>
        A fairly effective method at this stage is Linked data - a method of publishing structured data that
allows to link them and seek confirmation of hypotheses using semantic queries. Related data analysis
is particularly effective in presenting the data needed to solve hypotheses in an understandable form,
and is therefore an important component of the TH. Linked data can even help prioritize and direct
visualization, making it easier to search large datasets and use more powerful analytics. Methods of
analysis of both source and related data should be used to identify patterns in disparate data sets, to
detect the actions of attackers [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        In general, it is possible to identify four types of techniques that can be used by specialists in TH at
this stage [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p> The search is the simplest method of querying the collected data. The search criteria should
be specific enough so that the results are not unmanageable, but at the same time general enough
not to miss any actions of the attackers. If necessary, it is possible to use wildcards in queries.
 The clustering is a form of statistical analysis that separates groups (clusters) of similar data
points from a larger set based on specific characteristics, while grouping determines when several
unique data points appear together based on certain criteria, such as several events that occur in a
specific time window. The main difference is that the grouping requires an explicit set of data
points as input. However, both methods (clustering and grouping) are useful for detecting
anomalies.
 The stack counting or accumulation is a kind of application of frequency analysis to large
data sets to detect anomalies.
 The machine learning uses algorithms and statistical models to gradually increase the
productivity of a particular task; for TH – it is the detection of abnormal data that may indicate the
actions of attackers. In controlled machine learning, a set of training data is entered into the
algorithm, and each data point is marked with the desired result, both normal and anomalous data
are clearly defined.</p>
    </sec>
    <sec id="sec-10">
      <title>4.2.1. Selection of the suitable tools and technologies</title>
      <p>Today, there are many information security technologies that can provide assistance in the process
of TH. However, the authors of this paper tend to narrow the set of technologies to the next most
necessary.</p>
      <p> The class of SIEM (Security Information and Event Management) systems allows to monitor
information systems, analyze security events in real time, for example, occurring on workstations,
network devices, information security tools and other infrastructure elements. The data collected
and analyzed by it helps to identify incidents or anomalies that remain invisible to specialized
remedies.
 The class of EDR (Endpoint Detection and Response) systems is an alternative to traditional
anti-virus solutions and provides modern protection of endpoints with adaptation to the landscape
of complex threats. Such systems include both functionalities to detect complex attacks aimed at
endpoints, and are able to respond quickly to detected incidents.
 The class of NTA (Network Traffic Analysis) systems is a new category of network security
systems designed to intercept traffic flows and detect signs of complex, often targeted attacks.</p>
      <p>It is especially significant that all three types of systems (subject to the selection of relevant
solutions) support the possibility of seamless integration and continuous data exchange. That is, in
such a scheme, the NTA is responsible for the visibility of information transmitted over the network,
EDR delivers relevant information from endpoints, and SIEM aggregates event logs.</p>
      <p>As experts in the field of cybersecurity, the authors of this paper note that the above systems are
the technical basis for the construction of a modern SOC (Security Operations Center). SOC is a
specialized center for monitoring and prompt response to information security incidents. Such a center
is a group of information security experts who are responsible for continuous monitoring and analysis
of the security of the organization, using a combination of technological solutions and acting within
well-structured processes. SOC is designed to monitor activity in networks, servers and workstations,
databases, applications, websites and other systems, detecting abnormal and malicious actions that
may indicate a security incident or data compromise.</p>
      <p>It is important to note that most often TH processes seek to implement organizations that already
have their own SOC or use such services through outsourcing. Thus, it can be concluded that the
planning and implementation of the TH procedure in the daily process of information security can
afford organizations with a high level of maturity of security processes, which already have
established procedures and technologies for threat prevention and are ready to move to a higher level
the level of proactive threat response.
4.3.</p>
    </sec>
    <sec id="sec-11">
      <title>Stage 3 - Identification of tactics, techniques and procedures</title>
      <p>
        Passing the second stage with the help of tools allows to reveal new harmful patterns of behavior
and TTPs. This stage is one of the most critical in the whole cycle [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>The gap in the detection of violations arises from the ability of attackers to evade the mechanisms
of detection. As detection capabilities continue to evolve and expand, cybercriminals will find new
ways to evade these measures. Thus, over time, TTPs of attackers will evolve to ensure that they can
evade detection and act unnoticed in the IT environment.</p>
      <p>There are various models of attacker methodologies from which it is possible to begin to lay the
foundation for a TH strategy. The most famous collections of such methodologies are: The Lockheed
Martin Cyber Kill Chain, The Mandiant Attack Lifecycle and The MITRE ATT&amp;CK Framework.</p>
      <p>
        MITRE ATT&amp;CK is a structure that describes the methodologies used by attackers during
cyberattacks. It is presented in the form of a matrix consisting of eleven tactics, each of which
contains a list of related techniques [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>1. Initial access tactics are the vectors that attackers use to anchor a network.
2. Execution tactics are methods that lead to the execution of code controlled by an attacker in a
local or remote system.
3. Persistence tactics are any change in access, action or configuration of a system that ensures
that an attacker is constantly present in that system.
4. Privilege-enhancing tactics are the result of actions that allow an attacker to obtain a higher
level of permissions on a system or network.
5. Evasion tactics consist of techniques that the attacker can use to evade detection or evade
other defenses (firewalls, antivirus, etc.).
6. Credential access tactics include methods that provide access to or control over the credentials
of a system, domain, or service used in an enterprise environment.
7. Detection tactics consist of methods that allow an attacker to obtain information about the
system and internal network.
8. Lateral (horizontal) tactics consist of methods that allow an attacker to access and manage
remote systems on the network, as well as run tools in remote systems.
9. Collection tactics consist of methods used to identify and collect information, such as
confidential files, from the target network prior to exfiltration.
10. Exfiltration tactics include methods and attributes that lead or help an attacker to delete files
and information from the target network.
11. Command and control tactics show how attackers interact with systems under their control in
the target network.</p>
      <p>
        In addition, MITRE ATT&amp;CK can be useful in assessing the visibility of data - to identify all
currently described methods requires a sufficient number of data sources [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The tables in this
framework list the data sources and the number of methods that each source helps to identify (it
should be noted that most methods require multiple data sources). This can help determine the priority
of the organization's efforts to collect data [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
4.4.
      </p>
    </sec>
    <sec id="sec-12">
      <title>Stage 4 - Expansion of analytics</title>
      <p>
        The fourth stage of the cycle forms the basis for informing and enriching automated analytics.
Under no circumstances should threats be missed, it is important to automate them with the help of
analytics so that the TH team can continue to focus on the following procedures. This can be done in a
variety of ways, including developing a default search for regular execution, creating new analytics
using tools such as Sqrrl, Apache Spark, R or Python, or even providing feedback to a controlled
machine learning algorithm that confirms that the identified pattern of behavior is abnormal and
harmful [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The extension of analytics can take a simpler form - to provide a new compromise
indicator for comparison or to write a new SIEM rule for reactive detection. The faster automation of
TH, the less repetition will be required of specialists and the faster their skills can be used to test new
hypotheses [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Care should also be taken to ensure that any automated TH processes are reliable and
continue to be beneficial. After automation, each analytical process must be tested for accuracy,
which can be performed using metrics.
4.5.
      </p>
    </sec>
    <sec id="sec-13">
      <title>Metrics</title>
      <p>
        One of the main mistakes of organizations initiating the TH process to their overall information
security strategy is that they do not define metrics for assessing the TH either because of the difficulty
of defining such indicators or because they believe that because threat detection must be a flexible
process, indicators cannot be identified [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ].
      </p>
      <p>
        However, there are useful metrics that can measure the performance of the TH process to help
improve it, as well as help build a business case for further investment (financial and time) in staff
training and tools. The following is an approximate set of metrics that can be used [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
 Graph of trends and / or comparisons: number of incidents detected proactively (compared to
reactively).
 Percentage: data coverage (data types and asset coverage).
 Pie chart: number of hypotheses on MITRE ATT&amp;CK tactics.
 Service level: the percentage of successful THs that led to a new analytical conclusion or
detection rule; sensitivity and specificity of analytics or rules obtained as a result of TH (number
of true and false positive results) [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>Thus, we can conclude that the TH cycle is a simple but effective process that can radically
improve the level of security of the organization. This procedure is most effective when used in
conjunction with traditional security systems, complementing the measures and tools to detect cyber
threats that already exist in most organizations. The ultimate goal of TH should always be to go
through the four-stage loop as efficiently as possible.</p>
    </sec>
    <sec id="sec-14">
      <title>5. Developing Threat Hunting process diagram</title>
      <p>
        The “Hunting loop” by Sqrrl [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] provides a working and stable cycle of actions for experts.
However, in the context of organizations where there are information security departments wishing to
implement TH process, the cycle needs to be detailed and supplemented with initial data, as well as a
connection with the classic incident management process [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. The authors of the paper propose the
improvement of the original cycle, described on the Error! Reference source not found. and its
integration in the whole information security management system of organizations.
      </p>
      <p>
        The proposed extended functional diagram of the TH process includes components listed below:
 raw logs and telemetry from network and infrastructure assets of the organization;
 means of the initial analytics and information processing – SOC: SIEM, EDR, NTA, which
are described in more detail in paragraph 4.2.1;
 alerts and queries conducted by TH expert using initial analytics means;
 stage of the hypothesis creation enriched by the knowledge of the subject area, case
awareness (an individual situation description, identification of key issues of a case, analyzing a
case using relevant theoretical concepts from TH, learning problem-solving case studies) and
cyber threat intelligence as discussed in paragraph 4.1;
 preliminary data triage – an important stage in the analytic process, which involves the tasks
of ruling out the noise in the raw data, and identifying and grouping the data indicating the
suspicious events worth of further investigation [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], and prioritization before conducting the
research stage;
 stage of the research using tools and techniques enriched by the classic search, machine
learning and linked data method as discussed in paragraph 4.2;
 stage of the identification of the TTPs enriched by the trusted frameworks in the field, as
described in paragraph 4.3;
 detailed outputs of the expansion of analytics stage, such as: a default search for regular
execution, tuning a controlled machine learning algorithm, a new compromise indicator, a new
SIEM rule for reactive detection;
 incidents resolving plan as an ultimate goal of the incident management process, which is an
integral part of the organization's overall information security management process;
 metrics or Key Performance Indicators (KPIs), such as: accuracy, timeliness, completeness
and those described in more detail in paragraph 4.5 for the continuous performance management
of the TH process.
      </p>
    </sec>
    <sec id="sec-15">
      <title>6. Conclusions</title>
      <p>In this paper the structuring of a new approach to countering cyber threats – Threat Hunting, was
presented.</p>
      <p>This study shows that TH is an effective method of modern cyber threat countering for
organizations at a high level of maturity, that already have their own SOC or use such services
through outsourcing and are ready to move to the level of proactive threat response.</p>
      <p>The main purpose of the paper is achieved – a functional diagram of Threat Hunting approach is
proposed and the following objectives are solved:
 enrichment of the existing TH model with SOC analytics tools, queries improvement and
continuous performance measurement is proposed;
 a triad of the most important SOC tools is proposed for the effective implementation of the
analytics stage;
 the process of converting raw logs and telemetry from network and infrastructure assets of the
organization into structured queries for conducting TH is proposed and clarified;
 the place of cyber threat intelligence at the stage of hypothesis creation is determined as a
small part of the whole process of TH, which helps to disseminate effective information about
threats by understanding the motives, capabilities and methods of attackers to inform about
measures to reduce cybersecurity;
 the examples of effective metrics or KPIs to evaluate TH are proposed;
 the incidents resolving plan is proposed as an ultimate goal of the TH, which helps to fit it
into the existing process of incident management process, which is an integral part of the
organization's overall information security management process.</p>
    </sec>
    <sec id="sec-16">
      <title>7. Acknowledgements</title>
      <p>The authors of the paper express their deep gratitude to the Department of Cybersecurity and
Information protection of Taras Shevchenko National University of Kyiv for the help in the research
and the preparation of the work.</p>
    </sec>
    <sec id="sec-17">
      <title>8. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>R. van Os</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bakker</surname>
          </string-name>
          , R. Bouman, “
          <article-title>TaHiTI Threat Hunting Methodology”, FI-ISAC NL Publication</article-title>
          , version
          <volume>17</volume>
          .12.
          <year>2018</year>
          ,
          <year>2018</year>
          . URL: https://www.betaalvereniging.nl/wpcontent/uploads/DEF-TaHiTI
          <string-name>
            <surname>-Threat-</surname>
          </string-name>
          Hunting-Methodology.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] “Detecting the Unknown: A Guide to Threat Hunting, Home Office Digital</article-title>
          ,
          <source>Data and Technology, version 2.0</source>
          ,
          <year>2019</year>
          . URL: https://hodigital.blog.gov.uk/wpcontent/uploads/sites/161/2020/03/
          <article-title>Detecting-the-Unknown-A-Guide-to-Threat-Huntingv2.0</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Chuvakin</surname>
          </string-name>
          , “
          <article-title>How to Hunt for Security Threats”</article-title>
          , Gartner, Inc.,
          <year>2017</year>
          . URL: https://www.gartner.com/en/documents/3664330.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Akacki</surname>
          </string-name>
          , “
          <article-title>5 types of Threat Hunting”</article-title>
          ,
          <string-name>
            <surname>Sqrrl Data</surname>
            <given-names>URL</given-names>
          </string-name>
          : https://sqrrl.com/5-types-threathunting/
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Akacki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bianco</surname>
          </string-name>
          , R. Bejtlich, “
          <article-title>Huntpedia: Your Threat Hunting Knowledge Compendium”</article-title>
          ,
          <source>Sqrrl Data</source>
          ,
          <year>2018</year>
          . URL: https://www.threathunting.net/files/huntpedia.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] White paper: A Framework for Cyber Threat Hunting</article-title>
          ,
          <source>Sqrrl Data</source>
          ,
          <year>2018</year>
          . URL: https://www.threathunting.net/files/framework
          <article-title>-for-threat-hunting-whitepaper</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>R.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bianco</surname>
          </string-name>
          , “
          <article-title>Generating Hypotheses for Successful Threat Hunting”</article-title>
          ,
          <source>SANS Institute</source>
          ,
          <year>2016</year>
          . URL: https://www.sans.org/reading-room/whitepapers/threats/generating-hypothesessuccessful
          <string-name>
            <surname>-</surname>
          </string-name>
          threat-hunting-
          <volume>37172</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>MITRE</given-names>
            <surname>ATT&amp;CK Framework</surname>
          </string-name>
          ,
          <year>2020</year>
          . URL: https://attack.mitre.org/tactics/enterprise/
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
            <surname>Schmitt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. I.</given-names>
            <surname>Kandah</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Brownell</surname>
          </string-name>
          , “
          <source>Intelligent Threat Hunting in Software-Defined Networking”</source>
          ,
          <source>2019 IEEE International Conference on Consumer Electronics (ICCE)</source>
          ,
          <source>Las Vegas</source>
          ,
          <string-name>
            <surname>NV</surname>
          </string-name>
          , USA,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , doi: 10.1109/ICCE.
          <year>2019</year>
          .
          <volume>8661952</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>M.</given-names>
            <surname>Iavich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          , E. Jintcharadze,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Polishchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fesenko</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Abisheva</surname>
          </string-name>
          , “
          <article-title>Comparison and Hybrid Implementation of Blowfish, Twofish and RSA Cryptosystems”</article-title>
          ,
          <source>Proceedings of 2019 IEEE 2nd Ukraine Conference on Electrical and Computer</source>
          Engineering (UKRCON), Lviv, Ukraine,
          <year>2019</year>
          , pp.
          <fpage>970</fpage>
          -
          <lpage>974</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M. N. S.</given-names>
            <surname>Miazi</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. A. Pritom</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Shehab</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Chu</surname>
            and
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Wei</surname>
          </string-name>
          , “
          <source>The Design of Cyber Threat Hunting Games: A Case Study”</source>
          ,
          <source>2017 26th International Conference on Computer Communication and Networks (ICCCN)</source>
          , Vancouver, BC,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/ICCCN.
          <year>2017</year>
          .
          <volume>8038527</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Wafula</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          , “CARVE:
          <string-name>
            <given-names>A Scientific</given-names>
            <surname>Method-Based Threat Hunting Hypothesis Development Model</surname>
          </string-name>
          ”,
          <source>2019 IEEE International Conference on Electro Information Technology (EIT)</source>
          , Brookings,
          <string-name>
            <surname>SD</surname>
          </string-name>
          , USA,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/EIT.
          <year>2019</year>
          .
          <volume>8833792</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sydorenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Polozhentsev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fesenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Akatayev</surname>
          </string-name>
          , G. Zhilkishbayeva, “
          <article-title>Method of cybersecurity level determining for the critical information infrastructure of the state”</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>2616</volume>
          , pp.
          <fpage>332</fpage>
          -
          <lpage>341</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H.</given-names>
            <surname>Haddadpajouh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mohtadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dehghantanaha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Karimipour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Lin</surname>
          </string-name>
          and
          <string-name>
            <surname>K. -K. R. Choo</surname>
          </string-name>
          , “
          <article-title>A Multi-Kernel and Meta-heuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer”</article-title>
          ,
          <source>in IEEE Internet of Things Journal, doi: 10</source>
          .1109/JIOT.
          <year>2020</year>
          .
          <volume>3026660</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Oksiiuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Chaikovska</surname>
          </string-name>
          ,
          <string-name>
            <surname>A</surname>
          </string-name>
          . Fesenko, “
          <article-title>Security technique for authentication process in the cloud environment”</article-title>
          ,
          <source>Proceedings of 2019 IEEE International Scientific-Practical Conference: Problems of Infocommunications Science and Technology, PIC S and T</source>
          <year>2019</year>
          ,
          <year>October 2019</year>
          ,
          <volume>9061248</volume>
          , pp.
          <fpage>379</fpage>
          -
          <lpage>382</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A. N.</given-names>
            <surname>Jahromi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Hashemi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dehghantanha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R. M.</given-names>
            <surname>Parizi and K. -K. R. Choo</surname>
          </string-name>
          , “
          <article-title>An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems”</article-title>
          ,
          <source>in IEEE Transactions on Emerging Topics in Computational Intelligence</source>
          , vol.
          <volume>4</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>630</fpage>
          -
          <lpage>640</lpage>
          , Oct.
          <year>2020</year>
          , doi: 10.1109/TETCI.
          <year>2019</year>
          .
          <volume>2910243</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Yen</surname>
          </string-name>
          , K. Chen, “
          <article-title>A cyber security data triage operation retrieval system”</article-title>
          ,
          <source>Computers &amp; Security</source>
          , Volume
          <volume>76</volume>
          ,
          <year>2018</year>
          ,
          <fpage>12</fpage>
          -
          <lpage>31</lpage>
          , ISSN 0167-4048, DOI: 10.1016/j.cose.
          <year>2018</year>
          .
          <volume>02</volume>
          .011.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>