List of my works. Hope to add more interesting research to this list very soon.
Modern attacks against enterprises often have multiple targets inside the enterprise network. Due to the large size of these networks and increasingly stealthy attacks, attacker activities spanning multiple hosts are extremely difficult to correlate during a threat-hunting effort. In this paper, we present a method for a robust threat correlation framework that correlates similar attack behavior across multiple hosts observed during a cyberattack campaign.
Read more about our work:
Ostinato: Cross-host Attack Correlation Through Attack Activity Similarity Detection.
Sutanu Kumar Ghosh, Kiavash Satvat, Rigel Gjomemo, and V.N.Venkatakrishnan,
In Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India,
(Awarded Best Practice Paper)
I submitted this report as a requirement for my PhD qualifier exam. Read more.
Copyright © 2025 Sutanu Kumar Ghosh - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.