DACA: Automated Attack Scenarios and Dataset Generation

被引:0
|
作者
Korving, Frank [1 ]
Vaarandi, Risto [1 ]
机构
[1] Tallinn Univ Technol, Ctr Digital Forens & Cyber Secur, Tallinn, Estonia
关键词
security dataset; testbed; DevOps; detection engineering;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Computer networks and systems are under an ever-increasing risk of being attacked and abused. High-quality datasets can assist with in-depth analysis of attack scenarios, improve detection rules, and help educate analysts. However, existing solutions for creating such datasets suffer from a number of drawbacks. First, several solutions are not open source with publicly released implementations or are not vendor neutral. Second, some existing solutions neglect the complexity and variance of specific attack techniques when creating datasets or neglect certain attack types. Third, existing solutions are not fully automating the entire data collection pipeline. This paper presents and discusses the Dataset Creation and Acquisition Engine (DACA), a configurable dataset generation testbed, built around commonly used Infrastructure-as-Code (IaC) and DevOps tooling which can be used to create varied, reproducible datasets in a highly automated fashion. DACA acts as a versatile wrapper around existing virtualization technologies and can be used by blue as well as red teamers alike to run attack scenarios and generate datasets. These in turn can be used for tuning detection rules, for educational purposes or pushed into data processing pipelines for further analysis. To show DACA's effectiveness, DACA is used to create two extensive datasets examining covert DNS Tunnelling activity on which a detailed analysis is performed.
引用
收藏
页码:550 / 558
页数:9
相关论文
共 50 条
  • [1] Automated generation of attack trees
    Vigo, Roberto
    Nielson, Flemming
    Nielson, Hanne Riis
    Proceedings of the Computer Security Foundations Workshop, 2014, 2014-January : 337 - 350
  • [2] Automated Generation of Attack Trees
    Vigo, Roberto
    Nielson, Flemming
    Nielson, Hanne Riis
    2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 337 - 350
  • [3] Artificial Dataset Generation for Automated Aircraft Visual Inspection Artificial Dataset Generation for Automated Aircraft Visual Inspection
    Gaul, Nathan J.
    Leishman, Robert C.
    PROCEEDINGS OF THE 2021 IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE (NAECON), 2021, : 302 - 306
  • [4] An automated approach to generate Web applications attack scenarios
    Alata, Eric
    Kaaniche, Mohamed
    Nicomette, Vincent
    Akrout, Rim
    2013 SIXTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2013, : 78 - 85
  • [5] Automated generation and analysis of attack graphs
    Sheyner, O
    Haines, J
    Jha, S
    Lippmann, R
    Wing, JM
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 273 - 284
  • [6] Generation of a dataset for DoW attack detection in serverless architectures
    Candel, Jose Manuel Ortega
    Gimeno, Francisco Jose Mora
    Mora, Higinio Mora
    DATA IN BRIEF, 2024, 52
  • [7] Automated Generation of Attack Graphs Using NVD
    Aksu, M. Ugur
    Bicakci, Kemal
    Dilek, M. Hadi
    Ozbayoglu, A. Murat
    Tatli, E. Islam
    PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 135 - 142
  • [8] A Novel Dataset and Approach for Adversarial Attack Detection in Connected and Automated Vehicles
    Kim, Tae Hoon
    Krichen, Moez
    Alamro, Meznah A.
    Sampedro, Gabreil Avelino
    ELECTRONICS, 2024, 13 (12)
  • [9] Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
    Godefroy, Erwan
    Totel, Eric
    Hurfin, Michel
    Majorczyk, Frederic
    2014 10TH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY (IAS), 2014, : 23 - 28
  • [10] Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
    Godefroy, Erwan
    Totel, Eric
    Hurfin, Michel
    Majorczyk, Frederic
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (03): : 100 - 110