An Automated Post-Exploitation Model for Cyber Red Teaming

被引:0
|
作者
Benito, Ryan [1 ]
Shaffer, Alan [1 ]
Singh, Gurminder [1 ]
机构
[1] Naval Postgrad Sch, Monterey, CA 93943 USA
关键词
Red teaming; automated cyber post-exploitation; defensive cyber operations; web-based assessment;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Red teaming is a well-established methodology for ensuring and augmenting cyber system security; however, the training, expertise, and knowledge of appropriate tools and techniques required to perform effective red teaming come with a significant cost in time and resources. Large organizations such as the Department of Defense (DOD) use vulnerability assessment to identify software patches and other remediations for cyber systems to mitigate cyberspace exploitation. If a patch cannot be applied in a timely manner, for instance to minimize network downtime, measuring and identifying the impact of such unpatched vulnerabilities is left to scarce red teaming services. These services typically concentrate on initial access exploitation, which stops short of exploring the larger security impacts of cyber threats performing post-exploitation actions. This gap in post-exploitation red team analysis results in increased susceptibility to adversary offensive cyberspace operations (OCO) against DOD systems. This research extends the Cyber Automated Red Team Tool (CARTT), developed at the Naval Postgraduate School, by implementing automated red team post-exploitation analysis. The intent of this extended capability is to reduce the workload on limited DOD red teams and penetration testers by providing system administrators with the ability to perform deeper system analysis for the impacts of exploited vulnerabilities.
引用
收藏
页码:25 / 34
页数:10
相关论文
共 50 条
  • [1] Automation of post-exploitation
    Irani, Mohammad Tabatabai
    Weippl, Edgar R.
    INTERNATIONAL JOURNAL OF WEB INFORMATION SYSTEMS, 2009, 5 (04) : 518 - 536
  • [2] Mission-Centric Automated Cyber Red Teaming
    Randhawa, Suneel
    Turnbull, Benjamin
    Yuen, Joseph
    Dean, Jonathan
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [3] Automating post-exploitation with deep reinforcement learning
    Maeda, Ryusei
    Mimura, Mamoru
    COMPUTERS & SECURITY, 2021, 100
  • [4] Visual Analytics for Cyber Red Teaming
    Yuen, Joseph
    Turnbull, Benjamin
    Hernandez, Justin
    2015 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2015,
  • [5] Automation of Post-exploitation (Focused on MS-Windows Targets)
    Irani, Mohammad Tabatabai
    Weippl, Edgar R.
    SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 250 - 257
  • [6] AUTOMATED RED TEAMING: AN OBJECTIVE-BASED DATA FARMING APPROACH FOR RED TEAMING
    Chua, C. L.
    Sim, C. P. T. W. C.
    Choo, C. S.
    Tay, Victor
    2008 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2008, : 1456 - +
  • [7] Post-exploitation and Persistence Techniques Against Programmable Logic Controller
    Bytes, Andrei
    Zhou, Jianying
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2020, 2020, 12418 : 255 - 273
  • [8] Mayall: A Framework for Desktop Java']JavaScript Auditing and Post-Exploitation Analysis
    Rapley, Adam
    Bellekens, Xavier
    Shepherd, Lynsay A.
    McLean, Colin
    INFORMATICS-BASEL, 2018, 5 (04):
  • [9] Enhancing Automated Red Teaming with Evolvable Simulation
    Xu, YongLiang
    Low, Malcolm Yoke Hean
    Choo, Chwee Seng
    WORLD SUMMIT ON GENETIC AND EVOLUTIONARY COMPUTATION (GEC 09), 2009, : 687 - 694
  • [10] Post-exploitation bark recovery rates of some medicinal tree species in Ghana
    Mohammed, Issah
    Dompreh, Daniel
    Duah-Gyamfi, Akwasi
    Brobbey, Lawrence Kwabena
    Boakye, Emmanuel Amoah
    TREES FORESTS AND PEOPLE, 2022, 8