List of my works. Hope to add more interesting research to this list very soon.
We developed a robust framework that performs alert correlation and attack reconstruction through the usage of publicly available CTI data.
Read more: CITAR: Cyberthreat Intelligence-driven Attack Reconstruction
Sutanu Kumar Ghosh, Rigel Gjomemo, and V.N.Venkatakrishnan
In 15th ACM Conference on Data and Application Security and Privacy (CODASPY) 2025
In this paper, we present a method for a robust threat correlation framework that correlates similar attack behavior across multiple hosts observed during a cyberattack campaign.
Read more:
Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection.
Sutanu Kumar Ghosh, Kiavash Satvat, Rigel Gjomemo, and V.N.Venkatakrishnan,
In 18th International Conference on Information Systems Security (ICISS) 2022,
(Awarded Best Practice Paper)
A comprehensive review of detection and different threat-hunting approaches for APT groups.
Read more: Detection and Threat-Hunting Approaches for Advanced Persistent Threats
Sutanu Kumar Ghosh and Rigel Gjomemo
In Encyclopedia of Cryptography, Security and Privacy 2024
I submitted this report as a requirement for my PhD qualifier exam. Read more.