Toward Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach

被引:2
|
作者
Ajmal, Abdul Basit [1 ]
Khan, Shawal [1 ]
Alam, Masoom [1 ]
Mehbodniya, Abolfazl [2 ]
Webber, Julian [2 ]
Waheed, Abdul [3 ]
机构
[1] COMSATS Univ Islamabad CUI, Dept Comp Sci, Islamabad 45550, Pakistan
[2] Kuwait Coll Sci & Technol KCST, Dept Elect & Commun Engn, Kuwait 35003, Kuwait
[3] Women Univ Swabi, Dept Comp Sci, Swabi 23430, Pakistan
关键词
ATT & CK predictions; endpoint security evaluation; cyber attack simulations; penetration testing; stealthy attacks; defense evaluation; SECURITY;
D O I
10.1109/ACCESS.2023.3272629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Attackers compromise organizations with increasingly sophisticated ways, such as Advanced Persistent Threat (APT) attackers. Usually, such attacks have the intention to exploit endpoints to gain access to critical data. For security controls and defense evaluation, organizations may employ offensive security activities. The most important one is penetration testing and red teaming, but such operations are usually resource exhaustive and extend over a longer period of time. Furthermore, traditional Venerability Assessment and Penetration Testing (VAPT) works effectively in the mitigation of known attacks but did not prove to be effective against stealthy attacks. VAPT considers the whole offsec as an acting problem but in reality, an attacker has to deal with uncertainty while conducting real-world attacks. In this paper, we are presenting an adversary emulation approach based on MITRE ATT & CK adversary emulation plan with consideration of planning as a major part of each attack phase. The approach utilizes stealthy attack vectors and paths to emulate adversary for defense evaluation. For effective defense evaluation, we picked more than 40 techniques from ATT & CK, deployed their mitigation on target machines, and then launched attacks against all those techniques. We show that attack paths and payloads generated using our approach are strong enough to evade security controls at endpoints. This approach provides a special environment for cyber defenders to think like adversary, and create new attack vectors and paths to evaluate organizational security preparedness. This process constructs a special environment to expand the attack landscape view and defense evaluation with minimal resources for the organization.
引用
收藏
页码:70443 / 70458
页数:16
相关论文
共 50 条
  • [41] Cyber Defense as a Complex Adaptive System: A model-based approach to strategic policy design
    Norman, Michael D.
    Koehler, Matthew T. K.
    CSS 2017: THE 2017 INTERNATIONAL CONFERENCE OF THE COMPUTATIONAL SOCIAL SCIENCE SOCIETY OF THE AMERICAS, 2017,
  • [42] A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense
    Clark, Andrew
    Sun, Kun
    Bushnell, Linda
    Poovendran, Radha
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015, 2015, 9406 : 3 - 21
  • [43] Model-Based Threat Modeling for Cyber-Physical Systems: A Computer-Aided Approach
    Maidl, Monika
    Muenz, Gerhard
    Seltzsam, Stefan
    Wagner, Marvin
    Wirtz, Roman
    Heisel, Maritta
    SOFTWARE TECHNOLOGIES (ICSOFT 2020), 2021, 1447 : 158 - 183
  • [44] An anomaly-based approach for cyber-physical threat detection using network and sensor data
    Canonico, Roberto
    Esposito, Giovanni
    Navarro, Annalisa
    Romano, Simon Pietro
    Sperli, Giancarlo
    Vignali, Andrea
    COMPUTER COMMUNICATIONS, 2025, 234
  • [45] An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion
    Sun, Tianfang
    Yang, Pin
    Li, Mengming
    Liao, Shan
    FUTURE INTERNET, 2021, 13 (02): : 1 - 19
  • [46] Federated Threat-Hunting Approach for Microservice-Based Industrial Cyber-Physical System
    Abdel-Basset, Mohamed
    Hawash, Hossam
    Sallam, Karam
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) : 1905 - 1917
  • [47] Toward Evaluation of Deployment Architecture of ML-based Cyber-Physical Systems
    Gisselaire, Lucas
    Cario, Florian
    Guerre-berthelot, Quentin
    Zigmann, Bastien
    du Bousquet, Lydie
    Nakamura, Masahide
    2019 34TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2019), 2019, : 90 - 93
  • [48] Effective defense against fingerprinting attack based on autocorrelation property minimization approach
    Hojjat Jahani
    Saeed Jalili
    Journal of Intelligent Information Systems, 2020, 54 : 341 - 362
  • [49] A hierarchical evaluation approach for network security based on threat spread model
    Chen, Feng
    Liu, Dehui
    Zhang, Yi
    Su, Jishu
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2011, 48 (06): : 945 - 954
  • [50] Effective defense against fingerprinting attack based on autocorrelation property minimization approach
    Jahani, Hojjat
    Jalili, Saeed
    JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2020, 54 (02) : 341 - 362