A Threat Hunting Framework for Industrial Control Systems
An Industrial Control System (ICS) adversary often takes different actions to exploit vulnerabilities, pass the border between Information Technology (IT) and Operational Technology (OT) networks, and launch a targeted attack against OT networks.Detecting these threat actions in early phases before the final stage of the attacks can be executed aga