Sutanu k. ghosh

Sutanu k. ghoshSutanu k. ghoshSutanu k. ghoshSutanu k. ghosh
  • Home
  • Research
  • CTI/APT Analysis
  • Work
  • Apps
  • Contact

Sutanu k. ghosh

Sutanu k. ghoshSutanu k. ghoshSutanu k. ghosh
  • Home
  • Research
  • CTI/APT Analysis
  • Work
  • Apps
  • Contact

publications & WRITING

List of my works. Hope to add more interesting research to this list very soon. 

Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection

In this paper, we present a method for a robust threat correlation framework that correlates similar attack behavior across multiple hosts observed during a cyberattack campaign. 


Read more: 

Ostinato: Cross-host Attack Correlation Through Attack  Activity Similarity Detection. 

Sutanu Kumar Ghosh, Kiavash Satvat, Rigel Gjomemo, and V.N.Venkatakrishnan,  

In 18th International Conference on Information Systems Security (ICISS) 2022, 

(Awarded Best Practice Paper)


Detection and Threat-Hunting Approaches for Advanced Persistent Threats

A comprehensive review of detection and different threat-hunting approaches for APT groups.


Read more: Detection and Threat-Hunting Approaches for Advanced Persistent Threats

Sutanu Kumar Ghosh and Rigel Gjomemo

In Encyclopedia of Cryptography, Security and Privacy 2024


Citar: Cyberthreat Intelligence-driven Attack Reconstruction

We developed a robust framework that performs alert correlation and attack reconstruction through the usage of publicly available CTI data. 


Read more: CITAR: Cyberthreat Intelligence-driven Attack Reconstruction 

(PDF and the dataset will be available soon)

Sutanu Kumar Ghosh, Rigel Gjomemo, and V.N.Venkatakrishnan

In 15th ACM Conference on Data and Application Security and Privacy (CODASPY) 2025


Analysis & Critique of Threat Detection and Alert Correlation in Intrusion Detection Systems

I submitted this report as a requirement for my PhD qualifier exam. Read more.

Interested? Peek into these WORKS

Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection (pdf)Download
Detection and Threat-Hunting Approaches for Advanced Persistent Threats (pdf)Download
Analysis & Critique of Threat Detection and Alert Correlation in Intrusion Detection Systems (pdf)Download

Made with  ❤️  by Sutanu

Powered by