Threat Hunting the Shadows: Detecting Adversary Lateral Movement With Elasticsearch

This research investigates the elusive tactic of lateral movement employed by adversaries within a compromised network. The focus is on identifying the mechanisms and techniques used for lateral movement, with a particular emphasis on credential access. The study leverages a custom-designed Security...

Full description

Bibliographic Details
Published in:IEEE Access
Main Authors: Naif Alsharabi, Akashdeep Bhardwaj, Talal Sarheed Alshammari, Shoayee Alotaibi, Dhahi Alshammari, Amr Jadi
Format: Article
Language:English
Published: IEEE 2025-01-01
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10945781/