List of my works. Hope to add more interesting research to this list very soon.
In this paper, we present a method for a robust threat correlation framework that correlates similar attack behavior across multiple hosts observed during a cyberattack campaign.
Read more:
Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection.
Sutanu Kumar Ghosh, Kiavash Satvat, Rigel Gjomemo, and V.N.Venkatakrishnan,
In 18th International Conference on Information Systems Security (ICISS) 2022,
(Awarded Best Practice Paper)
A comprehensive review of detection and different threat-hunting approaches for APT groups.
Read more: Detection and Threat-Hunting Approaches for Advanced Persistent Threats
Sutanu Kumar Ghosh and Rigel Gjomemo
In Encyclopedia of Cryptography, Security and Privacy 2024
We developed a robust framework that performs alert correlation and attack reconstruction through the usage of publicly available CTI data.
Read more: CITAR: Cyberthreat Intelligence-driven Attack Reconstruction
(PDF and the dataset will be available soon)
Sutanu Kumar Ghosh, Rigel Gjomemo, and V.N.Venkatakrishnan
In 15th ACM Conference on Data and Application Security and Privacy (CODASPY) 2025
I submitted this report as a requirement for my PhD qualifier exam. Read more.