An Automated Post-Exploitation Model for Cyber Red Teaming

被引:0
|
作者
Benito, Ryan [1 ]
Shaffer, Alan [1 ]
Singh, Gurminder [1 ]
机构
[1] Naval Postgrad Sch, Monterey, CA 93943 USA
关键词
Red teaming; automated cyber post-exploitation; defensive cyber operations; web-based assessment;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Red teaming is a well-established methodology for ensuring and augmenting cyber system security; however, the training, expertise, and knowledge of appropriate tools and techniques required to perform effective red teaming come with a significant cost in time and resources. Large organizations such as the Department of Defense (DOD) use vulnerability assessment to identify software patches and other remediations for cyber systems to mitigate cyberspace exploitation. If a patch cannot be applied in a timely manner, for instance to minimize network downtime, measuring and identifying the impact of such unpatched vulnerabilities is left to scarce red teaming services. These services typically concentrate on initial access exploitation, which stops short of exploring the larger security impacts of cyber threats performing post-exploitation actions. This gap in post-exploitation red team analysis results in increased susceptibility to adversary offensive cyberspace operations (OCO) against DOD systems. This research extends the Cyber Automated Red Team Tool (CARTT), developed at the Naval Postgraduate School, by implementing automated red team post-exploitation analysis. The intent of this extended capability is to reduce the workload on limited DOD red teams and penetration testers by providing system administrators with the ability to perform deeper system analysis for the impacts of exploited vulnerabilities.
引用
收藏
页码:25 / 34
页数:10
相关论文
共 50 条
  • [31] Agentless Automation Model for Post Exploitation Penetration Testing
    Maddala, Saraswati
    Patil, Sonali
    INTELLIGENT COMPUTING, INFORMATION AND CONTROL SYSTEMS, ICICCS 2019, 2020, 1039 : 529 - 539
  • [32] Model of Automated Control of Telecommunication Layer of the Post-Industrial Society Cyber Environment in the Conditions of External Destructive Influences
    Verkhova, Galina V.
    Akimov, Sergei, V
    Belous, Konstantin, V
    PROCEEDINGS OF 2019 XXII INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2019, : 48 - 51
  • [33] Toward an automated attack model for red teams
    Ray, HT
    Vemuri, R
    Kantubhukta, HR
    IEEE SECURITY & PRIVACY, 2005, 3 (04) : 18 - 25
  • [34] Ecology-Inspired Cyber Risk Model for Propagation of Vulnerability Exploitation in Tactical Edge
    Morris-King, James
    Cam, Hasan
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 336 - 341
  • [35] Automated model-based image registration for tactical image exploitation
    Trask, D
    Cannata, R
    Hackett, JK
    AUTOMATED GEO-SPATIAL IMAGE AND DATA EXPLOITATION, 2000, 4054 : 19 - 29
  • [36] Shaping Influence and Influencing Shaping: A Computational Red Teaming Trust-Based Swarm Intelligence Model
    Tang, Jiangjun
    Petraki, Eleni
    Abbass, Hussein
    ADVANCES IN SWARM INTELLIGENCE, ICSI 2016, PT I, 2016, 9712 : 14 - 23
  • [37] Analysis of the rock mass and terrain surface behaviour in the region of the E 140 cavern in the Borehole Salt Mine "Lezkowice" field, during the post-exploitation backfill process, using FEM and geodetic measurements
    Cieslik, Jerzy
    Pietruszka, Krzysztof
    GOSPODARKA SUROWCAMI MINERALNYMI-MINERAL RESOURCES MANAGEMENT, 2008, 24 (02): : 359 - 369
  • [38] A Model of a Malware Infected Automated Guided Vehicle for Experimental Cyber-Physical Security
    French, Richard
    Degeler, Viktoriya
    Jones, Kevin
    PROCEEDINGS OF SAI INTELLIGENT SYSTEMS CONFERENCE (INTELLISYS) 2016, VOL 2, 2018, 16 : 672 - 688
  • [39] Bidding into the red: A model of post-auction bankruptcy
    Board, Simon
    JOURNAL OF FINANCE, 2007, 62 (06): : 2695 - 2723
  • [40] Nip in the Bud: Forecasting and Interpreting Post- Exploitation Attacks in Real-Time Through Cyber Threat Intelligence Reports
    Zhu, Tiantian
    Ying, Jie
    Chen, Tieming
    Xiong, Chunlin
    Cheng, Wenrui
    Yuan, Qixuan
    Zheng, Aohan
    Lv, Mingqi
    Chen, Yan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (02) : 1431 - 1447