Threat Hunting Modeling Based on Cybercrime and Attack Profiling
1.It contain 3 stage and 4 process for each stage have 4 process.
2.Using java to read the dataset and to detect DDOS attack.
3.Technique and Tactic mapping by using mittre attack and cve.
4. Come out with a tool to detect DDOS attack from Microsoft word, excel, pdf and any file.
5. Cybercrime threat profiling and attack profiling both of the technique then filtering based on attribute before proceed to mapping technique as well as automation tool.
Need freelance to help with my project, It contain 3 stage and 4 process
Sep 13 2023, 08:58 AM, updated 3y ago
Quote
0.0133sec
0.47
5 queries
GZIP Disabled