Threat Hunting the Shadows: Detecting Adversary Lateral Movement With Elasticsearch
This research investigates the elusive tactic of lateral movement employed by adversaries within a compromised network. The focus is on identifying the mechanisms and techniques used for lateral movement, with a particular emphasis on credential access. The study leverages a custom-designed Security...
| Published in: | IEEE Access |
|---|---|
| Main Authors: | , , , , , |
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10945781/ |
