Advanced Cyber Threat Intelligence and Hunting: Detect APTs and zero-day attacks using CTI, behavioral analytics, and AI techniques
暫譯: 進階網路威脅情報與獵捕:利用CTI、行為分析及AI技術偵測APT與零日攻擊
Tiepolo, Gianluca, Sorensen, Dan
- 出版商: Packt Publishing
- 出版日期: 2026-04-30
- 售價: $1,840
- 貴賓價: 9.5 折 $1,748
- 語言: 英文
- 頁數: 656
- 裝訂: Quality Paper - also called trade paper
- ISBN: 1806380390
- ISBN-13: 9781806380398
-
相關分類:
Penetration-test
海外代購書籍(需單獨結帳)
相關主題
商品描述
Develop actionable strategies to proactively hunt advanced persistent threats and detect zero-days using CTI and behavior-based detection techniques
Key Features:
- Intelligence-led threat hunting framework for detecting APTs and zero-day attacks at scale
- Hands-on detection of stealthy adversaries using behavioral analytics and machine learning
- Real-world hunting workflows across cloud, hybrid, and enterprise environments
Book Description:
Modern adversaries rely on stealth, living-off-the-land techniques, and zero-day exploitation to evade traditional security controls. This practical guide shows experienced defenders how to move beyond reactive alerts and build a proactive threat hunting capability driven by cyber threat intelligence.
Written for seasoned cybersecurity professionals, the book demonstrates how to formulate CTI-driven hunt hypotheses and detect advanced persistent threats by analyzing adversary behavior across the Cyber Kill Chain. You'll learn how to track APT infrastructure, map attacker TTPs using the MITRE ATT&CK framework, and identify post-exploitation activity that signals successful compromise.
Through hands-on exercises, you'll apply behavioral analytics, detection engineering, and machine learning-based anomaly detection to uncover what signature-based tools miss. Coverage includes threat hunting in cloud, hybrid, and ICS/OT environments, with real-world techniques for lateral movement, persistence, privilege escalation, and data exfiltration.
By the end of this book, you'll be equipped to run intelligence-led threat hunts, detect advanced threats earlier, and operationalize CTI as a core part of your defensive strategy.
What You Will Learn:
- Build CTI-driven hypotheses for proactive threat hunting
- Detect APT behavior across the Cyber Kill Chain
- Identify zero-day activity using behavioral analytics
- Apply MITRE ATT&CK to map adversary TTPs
- Use machine learning for anomaly-based detection
- Hunt post-exploitation activity and lateral movement
- Investigate threats in cloud and hybrid environments
- Design a scalable, resilient threat hunting program
Who this book is for:
This book is tailored for experienced, mid-to-senior level cybersecurity professionals operating in roles focused on proactive defense. The audience includes cyber threat hunters, cybersecurity analysts, cyber intelligence analysts, and incident responders. These profiles are looking to bridge the gap between intelligence production and its actionable application in live hunting operations, and this book will help them to achieve this.
Table of Contents
- Revisiting CTI for Advanced Threat Hunting
- Understanding APTs - Actors, Motivations, and TTPs
- Deep Dive - CTI Collection and Enrichment for APTs
- Core Principles of Proactive Threat Hunting
- Understanding Data Sources for Threat Hunting
- Hunting Zero-Days Through Behavioral Signatures
- Advanced Hunting Techniques and Queries
- Hunting Delivery and Initial Access
- Hunting for Exploitation and Execution
- Hunting for Persistence and Privilege Escalation
- Hunting for Lateral Movement and Discovery
- Hunting for Command and Control
- Hunting for Collection, Exfiltration, and Impact
- Attribution - Challenges and Techniques
- Behavioral Clustering for Zero-Day Detection
- Hunting in Cloud and Specialized Environments
- Building a Resilient Threat Hunting Program
- Emerging Trends in Threat Hunting and CTI
商品描述(中文翻譯)
發展可行的策略以主動追蹤高級持續性威脅並利用 CTI 和基於行為的檢測技術來檢測零日漏洞
主要特點:
- 以情報為導向的威脅追蹤框架,用於大規模檢測 APT 和零日攻擊
- 使用行為分析和機器學習進行隱秘對手的實際檢測
- 涵蓋雲端、混合和企業環境的實際追蹤工作流程
書籍描述:
現代對手依賴隱秘的生存技術和零日漏洞利用來逃避傳統的安全控制。這本實用指南向經驗豐富的防禦者展示如何超越反應性警報,建立由網路威脅情報驅動的主動威脅追蹤能力。
本書專為資深的網路安全專業人士撰寫,展示如何制定以 CTI 驅動的追蹤假設,並通過分析對手行為來檢測高級持續性威脅。您將學習如何追蹤 APT 基礎設施,使用 MITRE ATT&CK 框架映射攻擊者的 TTP,並識別成功入侵後的活動。
通過實作練習,您將應用行為分析、檢測工程和基於機器學習的異常檢測,揭示基於簽名的工具所遺漏的內容。內容包括在雲端、混合和 ICS/OT 環境中的威脅追蹤,並提供橫向移動、持續性、特權提升和數據外洩的實際技術。
在本書結束時,您將具備進行以情報為導向的威脅追蹤、早期檢測高級威脅的能力,並將 CTI 作為防禦策略的核心部分進行運用。
您將學到的內容:
- 建立以 CTI 驅動的假設以進行主動威脅追蹤
- 檢測 Cyber Kill Chain 中的 APT 行為
- 使用行為分析識別零日活動
- 應用 MITRE ATT&CK 映射對手的 TTP
- 使用機器學習進行基於異常的檢測
- 追蹤入侵後的活動和橫向移動
- 在雲端和混合環境中調查威脅
- 設計可擴展且具韌性的威脅追蹤計劃
本書適合的讀者:
本書專為經驗豐富的中高級網路安全專業人士量身打造,這些專業人士的角色專注於主動防禦。讀者包括網路威脅追蹤者、網路安全分析師、網路情報分析師和事件響應者。這些角色希望縮短情報產出與其在實際追蹤操作中的可行應用之間的差距,本書將幫助他們實現這一目標。
目錄
- 重新審視 CTI 以進行高級威脅追蹤
- 理解 APT - 行為者、動機和 TTP
- 深入探討 - APT 的 CTI 收集與增強
- 主動威脅追蹤的核心原則
- 理解威脅追蹤的數據來源
- 通過行為簽名追蹤零日漏洞
- 高級追蹤技術和查詢
- 追蹤交付和初始訪問
- 追蹤利用和執行
- 追蹤持續性和特權提升
- 追蹤橫向移動和發現
- 追蹤指揮和控制
- 追蹤收集、外洩和影響
- 歸因 - 挑戰和技術
- 用於零日檢測的行為聚類
- 在雲端和專門環境中的追蹤
- 建立一個具韌性的威脅追蹤計劃
- 威脅追蹤和 CTI 的新興趨勢