Tactics (7)
Techniques (443)
D3-AA
Agent Authentication
D3-ABPI
Application-based Process Isolation
D3-ACA
Active Certificate Analysis
D3-ACH
Application Configuration Hardening
D3-AH
Application Hardening
D3-AI
Asset Inventory
D3-AL
Account Locking
D3-ALLM
Active Logical Link Mapping
D3-AM
Access Modeling
D3-AMED
Access Mediation
D3-ANAA
Administrative Network Activity Analysis
D3-ANCI
Authentication Cache Invalidation
D3-ANET
Authentication Event Thresholding
D3-APA
Access Policy Administration
D3-APLM
Active Physical Link Mapping
D3-ARMA
Unpublished ARMA Model
D3-AVE
Asset Vulnerability Enumeration
D3-AZET
Authorization Event Thresholding
D3-BA
Bootloader Authentication
D3-BAN
Biometric Authentication
D3-BDI
Broadcast Domain Isolation
D3-BSE
Byte Sequence Emulation
D3-CA
Certificate Analysis
D3-CAA
Connection Attempt Analysis
D3-CBAN
Certificate-based Authentication
D3-CCSA
Credential Compromise Scope Analysis
D3-CE
Credential Eviction
D3-CERO
Certificate Rotation
D3-CF
Content Filtering
D3-CFC
Content Format Conversion
D3-CFP
Change Default Password
D3-CH
Credential Hardening
D3-CHN
Connected Honeynet
D3-CI
Configuration Inventory
D3-CIA
Container Image Analysis
D3-CM
Content Modification
D3-CNE
Content Excision
D3-CNR
Content Rebuild
D3-CNS
Content Substitution
D3-CP
Certificate Pinning
D3-CQ
Content Quarantine
D3-CR
Credential Revocation
D3-CRO
Credential Rotation
D3-CS
Credential Scrubbing
D3-CSPP
Client-server Payload Profiling
D3-CTS
Credential Transmission Scoping
D3-CV
Content Validation
D3-DA
Dynamic Analysis
D3-DAM
Domain Account Monitoring
D3-DCE
Dead Code Elimination
D3-DE
Decoy Environment
D3-DEM
Data Exchange Mapping
D3-DENCR
Disk Encryption
D3-DF
Decoy File
D3-DI
Data Inventory
D3-DKE
Disk Erasure
D3-DKF
Disk Formatting
D3-DKP
Disk Partitioning
D3-DLIC
Driver Load Integrity Checking
D3-DNR
Decoy Network Resource
D3-DNRA
Domain Name Reputation Analysis
D3-DNSAL
DNS Allowlisting
D3-DNSCE
DNS Cache Eviction
D3-DNSDL
DNS Denylisting
D3-DNSTA
DNS Traffic Analysis
D3-DO
Decoy Object
D3-DP
Decoy Persona
D3-DPLM
Direct Physical Link Mapping
D3-DPR
Decoy Public Release
D3-DQSA
Database Query String Analysis
D3-DRT
Domain Registration Takedown
D3-DST
Decoy Session Token
D3-DTP
Domain Trust Policy
D3-DUC
Decoy User Credential
D3-EAL
Executable Allowlisting
D3-EBWSAM
Endpoint-based Web Server Access Mediation
D3-EDL
Executable Denylisting
D3-EF
Email Filtering
D3-EFA
Emulated File Analysis
D3-EHB
Endpoint Health Beacon
D3-EHPV
Exception Handler Pointer Validation
D3-EI
Execution Isolation
D3-ER
Email Removal
D3-ET
Encrypted Tunnels
D3-FA
File Analysis
D3-FAPA
File Access Pattern Analysis
D3-FBA
Firmware Behavior Analysis
D3-FC
File Carving
D3-FCA
File Creation Analysis
D3-FCDC
File Content Decompression Checking
D3-FCOA
File Content Analysis
D3-FCR
File Content Rules
D3-FE
File Encryption
D3-FEMC
Firmware Embedded Monitoring Code
D3-FEV
File Eviction
D3-FFV
File Format Verification
D3-FH
File Hashing
D3-FHRA
File Hash Reputation Analysis
D3-FIM
File Integrity Monitoring
D3-FISV
File Internal Structure Verification
D3-FMBV
File Magic Byte Verification
D3-FMCV
File Metadata Consistency Validation
D3-FMVV
File Metadata Value Verification
D3-FRDDL
Forward Resolution Domain Denylisting
D3-FRIDL
Forward Resolution IP Denylisting
D3-FV
Firmware Verification
D3-HBPI
Hardware-based Process Isolation
D3-HBWP
Hardware-based Write Protection
D3-HCI
Hardware Component Inventory
D3-HD
Homoglyph Detection
D3-HDDL
Hierarchical Domain Denylisting
D3-HDL
Homoglyph Denylisting
D3-HR
Host Reboot
D3-HS
Host Shutdown
D3-IAA
Identifier Activity Analysis
D3-IBCA
Indirect Branch Call Analysis
D3-ID
Identifier Analysis
D3-IDA
Input Device Analysis
D3-IHN
Integrated Honeynet
D3-IOPR
IO Port Restriction
D3-IPCTA
IPC Traffic Analysis
D3-IPRA
IP Reputation Analysis
D3-IRA
Identifier Reputation Analysis
D3-IRV
Integer Range Validation
D3-ISVA
Inbound Session Volume Analysis
D3-ITF
Inbound Traffic Filtering
D3-JFAPA
Job Function Access Pattern Analysis
D3-KBPI
Kernel-based Process Isolation
D3-LAM
Local Account Monitoring
D3-LAMED
LAN Access Mediation
D3-LFAM
Local File Access Mediation
D3-LFP
Local File Permissions
D3-LLM
Logical Link Mapping
D3-MA
Message Analysis
D3-MAN
Message Authentication
D3-MBSV
Memory Block Start Validation
D3-MBT
Memory Boundary Tracking
D3-MENCR
Message Encryption
D3-MFA
Multi-factor Authentication
D3-MH
Message Hardening
D3-NAM
Network Access Mediation
D3-NI
Network Isolation
D3-NM
Network Mapping
D3-NNI
Network Node Inventory
D3-NPC
Null Pointer Checking
D3-NRAM
Network Resource Access Mediation
D3-NTA
Network Traffic Analysis
D3-NTCD
Network Traffic Community Deviation
D3-NTF
Network Traffic Filtering
D3-NTPM
Network Traffic Policy Mapping
D3-NTSA
Network Traffic Signature Analysis
D3-NVA
Network Vulnerability Assessment
D3-OAM
Operational Activity Mapping
D3-ODM
Operational Dependency Mapping
D3-OE
Object Eviction
D3-OM
Organization Mapping
D3-OMM
Operating Mode Monitoring
D3-OPR
Operating Mode Restriction
D3-ORA
Operational Risk Assessment
D3-OSM
Operating System Monitoring
D3-OTF
Outbound Traffic Filtering
D3-OTP
One-time Password
D3-PA
Process Analysis
D3-PAM
Physical Access Mediation
D3-PAN
Pointer Authentication
D3-PBWSAM
Proxy-based Web Server Access Mediation
D3-PCA
Passive Certificate Analysis
D3-PCSV
Process Code Segment Verification
D3-PE
Process Eviction
D3-PFV
Peripheral Firmware Verification
D3-PH
Platform Hardening
D3-PHDURA
Per Host Download-Upload Ratio Analysis
D3-PLA
Process Lineage Analysis
D3-PLLM
Passive Logical Link Mapping
D3-PLM
Physical Link Mapping
D3-PM
Platform Monitoring
D3-PMAD
Protocol Metadata Anomaly Detection
D3-PR
Password Rotation
D3-PS
Process Suspension
D3-PSA
Process Spawn Analysis
D3-PSEP
Process Segment Execution Prevention
D3-PSMD
Process Self-Modification Detection
D3-PT
Process Termination
D3-PV
Pointer Validation
D3-PWA
Password Authentication
D3-RA
Restore Access
D3-RAM
Routing Access Mediation
D3-RAPA
Resource Access Pattern Analysis
D3-RC
Restore Configuration
D3-RD
Restore Database
D3-RDI
Restore Disk Image
D3-RE
Restore Email
D3-RF
Restore File
D3-RFAM
Remote File Access Mediation
D3-RFS
RF Shielding
D3-RIC
Reissue Credential
D3-RKD
Registry Key Deletion
D3-RN
Reference Nullification
D3-RNA
Restore Network Access
D3-RO
Restore Object
D3-RPA
Relay Pattern Analysis
D3-RRID
Reverse Resolution IP Denylisting
D3-RS
Restore Software
D3-RTA
RPC Traffic Analysis
D3-RTSD
Remote Terminal Session Detection
D3-RUAA
Restore User Account Access
D3-SAOR
Segment Address Offset Randomization
D3-SBV
Service Binary Verification
D3-SCA
System Call Analysis
D3-SCF
System Call Filtering
D3-SCH
Source Code Hardening
D3-SCP
System Configuration Permissions
D3-SDA
Session Duration Analysis
D3-SDM
System Daemon Monitoring
D3-SEA
Script Execution Analysis
D3-SFA
System File Analysis
D3-SFCV
Stack Frame Canary Validation
D3-SFV
System Firmware Verification
D3-SHN
Standalone Honeynet
D3-SICA
System Init Config Analysis
D3-SJA
Scheduled Job Analysis
D3-SMRA
Sender MTA Reputation Analysis
D3-SPP
Strong Password Policy
D3-SRA
Sender Reputation Analysis
D3-SSC
Shadow Stack Comparisons
D3-ST
Session Termination
D3-SU
Software Update
D3-SVCDM
Service Dependency Mapping
D3-SWI
Software Inventory
D3-SYSDM
System Dependency Mapping
D3-SYSM
System Mapping
D3-SYSVA
System Vulnerability Assessment
D3-TAAN
Transfer Agent Authentication
D3-TB
Token Binding
D3-TBA
Token-based Authentication
D3-TBI
TPM Boot Integrity
D3-TL
Trusted Library
D3-UA
URL Analysis
D3-UAP
User Account Permissions
D3-UBA
User Behavior Analysis
D3-UDTA
User Data Transfer Analysis
D3-UGLPA
User Geolocation Logon Pattern Analysis
D3-ULA
Unlock Account
D3-URA
URL Reputation Analysis
D3-USICA
User Session Init Config Analysis
D3-VI
Variable Initialization
D3-VTV
Variable Type Validation
D3-WSAA
Web Session Activity Analysis
D3-WSAM
Web Session Access Mediation
D3A-AAD
Unpublished Average Absolute Deviation
D3A-ABC
Unpublished ANN-based Clustering
D3A-AC
Unpublished Actor-Critic
D3A-AFTL
Unpublished Asymmetric Feature-based Transfer Learning
D3A-AL
Unpublished Alethic Logic
D3A-AM
Unpublished ARIMA Model
D3A-ANNC
Unpublished Artificial Neural Network Classification
D3A-ARL
Unpublished Association Rule Learning
D3A-ARTC
Unpublished Adaptive Resonance Theory Clustering
D3A-ASM
Unpublished Approximate String Matching
D3A-ASP
Unpublished Answer Set Programming
D3A-AUT
Unpublished Autoencoding
D3A-BA
Unpublished Bootstrap Aggregating
D3A-BE
Unpublished Bayesian Estimation
D3A-BEM
Unpublished Boolean Expression Matching
D3A-BER
Unpublished BERT
D3A-BHT
Unpublished Bayesian Hypothesis Testing
D3A-BLR
Unpublished Bayesian Linear Regression
D3A-BLRL
Unpublished Bayesian Linear Regression Learning
D3A-BM
Unpublished Bayesian Method
D3A-BMA
Unpublished Bayesian Model Averaging
D3A-BMC
Unpublished Bayesian Model Combination
D3A-BOC
Unpublished Bayes Optimal Classifier
D3A-BOM
Unpublished Bucket of Models
D3A-BOO
Unpublished Boosting
D3A-C4.
Unpublished C4.5
D3A-C5.
Unpublished C5.0
D3A-CA
Unpublished Cluster Analysis
D3A-CAR
Unpublished CART
D3A-CBC
Unpublished Centroid-based Clustering
D3A-CC
Unpublished Canopy Clustering
D3A-CLA
Unpublished Classification
D3A-CNN
Unpublished Convolutional Neural Network
D3A-COR
Unpublished Correlation
D3A-COV
Unpublished Coefficient of Variation
D3A-CT
Unpublished Central Tendency
D3A-CV
Unpublished Cramer's V
D3A-CYC
Unpublished CycleGAN
D3A-DA
Unpublished Discriminant Analysis
D3A-DAT
Unpublished Datalog
D3A-DBC
Unpublished DNN-based Clustering
D3A-DBS
Unpublished DBSCAN
D3A-DC
Unpublished Divisive Clustering
D3A-DCG
Unpublished Deep Convolutional GAN
D3A-DL
Unpublished Deontic Logic
D3A-DNNC
Unpublished Deep Neural Network Classification
D3A-DP
Unpublished Distribution Properties
D3A-DQ
Unpublished Dyna-Q
D3A-DQL
Unpublished Deep Q-learning
D3A-DR
Unpublished Dimension Reduction
D3A-DS
Unpublished Descriptive Statistics
D3A-DT
Unpublished Decision Tree
D3A-DTR
Unpublished Decision Tree Regression
D3A-DWM
Unpublished Density-weighted Method
D3A-EER
Unpublished Expected Error Reduction
D3A-EL
Unpublished Ensemble Learning
D3A-EM
Unpublished Equivalence Matching
D3A-EMC
Unpublished Expected Model Change
D3A-EST
Unpublished Estimation
D3A-FL
Unpublished Fuzzy Logic
D3A-FOL
Unpublished First-order Logic
D3A-GAKG
Unpublished Goodman and Kruskal's Gamma
D3A-GAN
Unpublished Generative Adversarial Network
D3A-GBC
Unpublished Graph-based Clustering
D3A-GBDT
Unpublished Gradient-Boosted Decision Tree
D3A-GBSSL
Unpublished Graph-based Semi-supervised Learning
D3A-GC
Unpublished Grid-CNN
D3A-GM
Unpublished Geometric Mean
D3A-GPT
Unpublished GPT
D3A-GRU
Unpublished Gated Recurrent Unit
D3A-HAFBTL
Unpublished Heterogeneous Asymmetric Feature-based Transfer Learning
D3A-HBTL
Unpublished Hybrid-based Transfer Learning
D3A-HC
Unpublished Hierarchical Clustering
D3A-HDC
Unpublished High-dimension Clustering
D3A-HFBTL
Unpublished Heterogeneous Feature-based Transfer Learning
D3A-HM
Unpublished Harmonic Mean
D3A-HOL
Unpublished Higher-order Logic
D3A-HT
Unpublished Hypothesis Testing
D3A-HTL
Unpublished Heterogeneous Transfer Learning
D3A-IBTL
Unpublished Instance-based Transfer Learning
D3A-ID3
Unpublished ID3
D3A-IE
Unpublished Interval Estimation
D3A-IR
Unpublished Interquartile Range
D3A-IS
Unpublished Inferential Statistics
D3A-ISG
Unpublished Image Synthesis GAN
D3A-ISSL
Unpublished Intrinsically Semi-supervised Learning
D3A-ITITG
Unpublished Image-to-Image Translation GAN
D3A-KCC
Unpublished K-Center Clustering
D3A-KFCV
Unpublished K-Fold Cross-Validation
D3A-KMC
Unpublished K-means Clustering
D3A-KNN
Unpublished K-Nearest Neighbors
D3A-KRCC
Unpublished Kendall's Rank Correlation Coefficient
D3A-KUR
Unpublished Kurtosis
D3A-LC
Unpublished Linear Classifier
D3A-LLP
Unpublished Linear Logic Programming
D3A-LM
Unpublished Levenschtein Matching
D3A-LP
Unpublished Logic Programming
D3A-LR
Unpublished Linear Regression
D3A-LRL
Unpublished Linear Regression Learning
D3A-LSTM
Unpublished Long Short-term Memory
D3A-MA
Unpublished Multivariate Analysis
D3A-MAD
Unpublished Median Absolute Deviation
D3A-MAM
Unpublished Moving Average Model
D3A-MBPO
Unpublished Model-based Policy Optimization
D3A-MBRL
Unpublished Model-based Reinforcement Learning
D3A-MBVI
Unpublished Model-based Value Iteration
D3A-MEA
Unpublished Mean
D3A-MED
Unpublished Median
D3A-MFRL
Unpublished Model-free Reinforcement Learning
D3A-ML
Unpublished Modal Logic
D3A-MML
Unpublished Maximum-margin Learning
D3A-MOD
Unpublished Mode
D3A-MOM
Unpublished Moments
D3A-MPC
Unpublished Multilayer Perceptron Classification
D3A-MR
Unpublished Multiple Regression
D3A-MRL
Unpublished Multiple Regression Learning
D3A-NBC
Unpublished Naive Bayes Classifier
D3A-NML
Unpublished Non-monotonic Logic
D3A-NPM
Unpublished Numeric Pattern Matching
D3A-NPT
Unpublished Non-Parametric Tests
D3A-NR
Unpublished Nonlinear Regression
D3A-NRL
Unpublished Nonlinear Regression Learning
D3A-OWL
Unpublished OWL
D3A-PBC
Unpublished Projection-based Clustering
D3A-PBCC
Unpublished Point-biserial Correlation Coefficient
D3A-PBL
Unpublished Perturbation-based Learning
D3A-PBTL
Unpublished Parameter-based Transfer Learning
D3A-PC
Unpublished Projected Clustering
D3A-PCA
Unpublished Principal Component Analysis
D3A-PCC
Unpublished Pearson's Correlation Coefficient
D3A-PE
Unpublished Point Estimation
D3A-PG
Unpublished Policy Gradient
D3A-PGG
Unpublished Progressively Growing GAN
D3A-PIX
Unpublished Pix2Pix
D3A-PL
Unpublished Propositional Logic
D3A-PM
Unpublished Pattern Matching
D3A-PRO
Unpublished Prolog
D3A-PT
Unpublished Parametric Tests
D3A-QBC
Unpublished Query By Committee
D3A-QL
Unpublished Q-Learning
D3A-RA
Unpublished Regression Analysis
D3A-RAL
Unpublished Regression Analysis Learning
D3A-RAN
Unpublished Range
D3A-RBTL
Unpublished Relational-based Transfer Learning
D3A-RC
Unpublished Rank Correlation
D3A-RE
Unpublished Resampling Ensemble
D3A-RF
Unpublished Random Forest
D3A-RL
Unpublished Reinforcement Learning
D3A-RM
Unpublished Regex Matching
D3A-RNN
Unpublished Recurrent Neural Network
D3A-RS
Unpublished Random Splits
D3A-SAR
Unpublished SARSA
D3A-SC
Unpublished Spectral Clustering
D3A-SD
Unpublished Somers' D
D3A-SEM
Unpublished String Equivalence Matching
D3A-SEQ
Unpublished SeqGAN
D3A-SFTL
Unpublished Symmetric Feature-based Transfer Learning
D3A-SKE
Unpublished Skewness
D3A-SL
Unpublished Symbolic Logic
D3A-SM
Unpublished Soundex Matching
D3A-SOM
Unpublished Self-organizing Map
D3A-SPM
Unpublished String Pattern Matching
D3A-SR
Unpublished Symbolic AI
D3A-SRCC
Unpublished Spearman's Rank Correlation Coefficient
D3A-SSB
Unpublished Semi-supervised Boosting
D3A-SSCT
Unpublished Semi-supervised Co-training
D3A-SSCTL
Unpublished Semi-supervised Cluster-then-label
D3A-SSFE
Unpublished Semi-supervised Feature Extraction
D3A-SSGML
Unpublished Semi-supervised Generative Model Learning
D3A-SSIL
Unpublished Semi-supervised Inductive Learning
D3A-SSL
Unpublished Semi-Supervised Learning
D3A-SSML
Unpublished Semi-supervised Manifold Learning
D3A-SSPT
Unpublished Semi-supervised Pre-training
D3A-SSST
Unpublished Semi-supervised Self-training
D3A-SSTL
Unpublished Semi-supervised Transductive Learning
D3A-SSWM
Unpublished Semi-supervised Wrapper Method
D3A-STA
Unpublished Stacking
D3A-STY
Unpublished StyleGAN
D3A-SVD
Unpublished Singular Value Decomposition
D3A-SVMC
Unpublished Support Vector Machine Classification
D3A-TBL
Unpublished Transformer-based Learning
D3A-TDL
Unpublished Temporal Difference Learning
D3A-TL
Unpublished Temporal Logic
D3A-TM
Unpublished Trimmed Mean
D3A-TSA
Unpublished Time Series Analysis
D3A-TSC
Unpublished t-SNE Clustering
D3A-TX
Unpublished Transformer-XL
D3A-UL
Unpublished Unsupervised Learning
D3A-UP
Unpublished Unsupervised Preprocessing
D3A-US
Unpublished Uncertainty Sampling
D3A-VAR
Unpublished Variability
D3A-VOT
Unpublished Voting
D3A-VR
Unpublished Variance Reduction
D3A-WM
Unpublished Weighted Mean