Toward Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach

被引:2
|
作者
Ajmal, Abdul Basit [1 ]
Khan, Shawal [1 ]
Alam, Masoom [1 ]
Mehbodniya, Abolfazl [2 ]
Webber, Julian [2 ]
Waheed, Abdul [3 ]
机构
[1] COMSATS Univ Islamabad CUI, Dept Comp Sci, Islamabad 45550, Pakistan
[2] Kuwait Coll Sci & Technol KCST, Dept Elect & Commun Engn, Kuwait 35003, Kuwait
[3] Women Univ Swabi, Dept Comp Sci, Swabi 23430, Pakistan
关键词
ATT & CK predictions; endpoint security evaluation; cyber attack simulations; penetration testing; stealthy attacks; defense evaluation; SECURITY;
D O I
10.1109/ACCESS.2023.3272629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attackers compromise organizations with increasingly sophisticated ways, such as Advanced Persistent Threat (APT) attackers. Usually, such attacks have the intention to exploit endpoints to gain access to critical data. For security controls and defense evaluation, organizations may employ offensive security activities. The most important one is penetration testing and red teaming, but such operations are usually resource exhaustive and extend over a longer period of time. Furthermore, traditional Venerability Assessment and Penetration Testing (VAPT) works effectively in the mitigation of known attacks but did not prove to be effective against stealthy attacks. VAPT considers the whole offsec as an acting problem but in reality, an attacker has to deal with uncertainty while conducting real-world attacks. In this paper, we are presenting an adversary emulation approach based on MITRE ATT & CK adversary emulation plan with consideration of planning as a major part of each attack phase. The approach utilizes stealthy attack vectors and paths to emulate adversary for defense evaluation. For effective defense evaluation, we picked more than 40 techniques from ATT & CK, deployed their mitigation on target machines, and then launched attacks against all those techniques. We show that attack paths and payloads generated using our approach are strong enough to evade security controls at endpoints. This approach provides a special environment for cyber defenders to think like adversary, and create new attack vectors and paths to evaluate organizational security preparedness. This process constructs a special environment to expand the attack landscape view and defense evaluation with minimal resources for the organization.
引用
收藏
页码:70443 / 70458
页数:16
相关论文
共 50 条
  • [1] Cyber threat hunting using unsupervised federated learning and adversary emulation
    Sheikhi, Saeid
    Kostakos, Panos
    2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2023, : 315 - 320
  • [2] Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence
    Haque, Md. Farhan
    Krishnan, Ram
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (04) : 883 - 896
  • [3] Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence
    Md. Farhan Haque
    Ram Krishnan
    Information Systems Frontiers, 2021, 23 : 883 - 896
  • [4] TDLens: Toward an Empirical Evaluation of Provenance Graph-Based Approach to Cyber Threat Detection
    Rui Mei
    Hanbing Yan
    Qinqin Wang
    Zhihui Han
    Zhuohang Lyu
    ChinaCommunications, 2022, 19 (10) : 102 - 115
  • [5] TDLens: Toward an Empirical Evaluation of Provenance Graph-Based Approach to Cyber Threat Detection
    Mei, Rui
    Yan, Hanbing
    Wang, Qinqin
    Han, Zhihui
    Lyu, Zhuohang
    CHINA COMMUNICATIONS, 2022, 19 (10) : 102 - 115
  • [6] Proactive Defense Model Based on Cyber Threat Analysis
    Osako, Takeshi
    Suzuki, Tomoyoshi
    Iwata, Yoichi
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2016, 52 (03): : 72 - 77
  • [7] Proactive defense model based on cyber threat analysis
    Osako, Takeshi
    Suzuki, Tomoyoshi
    Iwata, Yoichi
    Fujitsu Scientific and Technical Journal, 2016, 52 (03): : 72 - 77
  • [8] A Model of APT Attack Defense Based on Cyber Threat Detection
    Li, Yue
    Zhang, Teng
    Li, Xue
    Li, Ting
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 122 - 135
  • [9] An Effective Approach of Named Entity Recognition for Cyber Threat Intelligence
    Wu, Han
    Li, Xiaoyong
    Gao, Yali
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 1370 - 1374
  • [10] Cyber threat assessment via attack scenario simulation using an integrated adversary and network modeling approach
    Moskal, Stephen
    Yang, Shanchieh Jay
    Kuhl, Michael E.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (01): : 13 - 29