Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks

被引:0
|
作者
Aybar, Luis [1 ]
Singh, Gurminder [1 ]
Shaffer, Alan [1 ]
机构
[1] Naval Postgrad Sch, Monterey, CA 93943 USA
关键词
offensive cyber operations; simulated malware; cyber-attack rehearsal; cyber effects development; virtualized networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyberspace is recognized as a critical domain in modern warfare. The ability of military forces to maintain and secure their own operational networks, while simultaneously degrading or denying the ability of adversaries to operate their networks, is a critical strategic objective for military planners and leaders. Conducting effective offensive cyber operations (OCO) against sophisticated adversary networks requires the ability to develop, test, and rehearse cyber-attack actions before they are employed operationally. This requirement is well understood and practiced in the physical warfare domains, where ships, aircraft and tanks can exercise their capabilities against physical targets; it is not, however, well refined in the cyber domain. This research introduces a framework to address this need, and demonstrates a prototype for cyber-attack scenario development and rehearsal in a virtual network environment. By extending the earlier work of the Naval Postgraduate School's Malicious Activity Simulation Tool (MAST), a distributed client-server based software tool designed to launch inert malware attacks on live networks, we were able to demonstrate cyber-attack scenarios based on temporal specificity and target discrimination as attack parameters. Our prototype accurately models an adversary network in a virtual environment, providing the ability to develop cyber-attack actions to achieve specific cyber effects against hosts on the intended target network. The architecture allows cyber forces to rehearse specific cyber actions prior to launching a cyber-attack, in order to provide a more accurate assessment of the efficacy of these actions against a realistic model of the target network. This framework allows military forces to better train and prepare for cyber operations to help achieve cyber superiority in modern warfare.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 43 条
  • [1] Identification of cyber-attack scenarios in a marine Dual-Fuel engine
    Bolbot, V.
    Methlouthi, O.
    Banda, O. Valdez
    Xiang, L.
    Ding, Y.
    Brunou, P.
    [J]. TRENDS IN MARITIME TECHNOLOGY AND ENGINEERING, MARTECH 2022, VOL 1, 2022, 8 : 503 - 510
  • [2] ASSESSING SEVERITY OF CYBER-ATTACK THREATS AGAINST CYBER-MANUFACTURING SYSTEMS
    Espinoza-Zelaya, Carlos
    Moon, Young
    [J]. PROCEEDINGS OF ASME 2022 INTERNATIONAL MECHANICAL ENGINEERING CONGRESS AND EXPOSITION, IMECE2022, VOL 2B, 2022,
  • [3] Development of Cyber-Attack Scenarios for Nuclear Power Plants Using Scenario Graphs
    Ahn, Woogeun
    Chung, Manhyun
    Min, Byung-Gil
    Seo, Jungtaek
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [4] Fault-Tree Based Prevention Analysis of Cyber-Attack Scenarios for PRA Applications
    Yadav, Vaibhav
    Youngblood, Robert W.
    Le Blanc, Katya L.
    Perschon, Jeremy
    Pitcher, Ryan
    [J]. 2019 ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM (RAMS 2019) - R & M IN THE SECOND MACHINE AGE - THE CHALLENGE OF CYBER PHYSICAL SYSTEMS, 2019,
  • [5] CyVi: Visualization of Cyber-Attack and Defense Effects in Geographically Referenced Networks
    Muhati, Eric
    Rawat, Danda B.
    Garuha, Moses
    Njilla, Laurent
    [J]. 2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [6] Stability Analysis of Two-Species PDE Traffic Models in Cyber-Attack Scenarios
    Kashyap, Abhishek
    Chakravarthy, Animesh
    Menon, Prathyush P.
    [J]. 2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 3330 - 3336
  • [7] A Hybrid-Transformer-Based Cyber-Attack Detection in IoT Networks
    Al-Halboosi, Imad Tareq
    Elbagoury, Bassant Mohamed
    El-Regaily, Salsabil Amin
    El-Horbaty, El-Sayed M.
    [J]. International Journal of Interactive Mobile Technologies, 2024, 18 (14) : 90 - 102
  • [8] Remedial Control Scheme of PV Systems Against Cyber-Attack in AC Microgrid
    Prasad, Udit
    Jagan, Amar
    Mohanty, Soumya R.
    Singh, S. P.
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON POWER ELECTRONICS, DRIVES AND ENERGY SYSTEMS, PEDES, 2022,
  • [9] Accuracy improvement of electrical load forecasting against new cyber-attack architectures
    Aflaki, Arshia
    Gitizadeh, Mohsen
    Kantarci, Burak
    [J]. SUSTAINABLE CITIES AND SOCIETY, 2022, 77
  • [10] Counteractive control against cyber-attack uncertainties on frequency regulation in the power system
    Prasad, Sheetla
    [J]. IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2020, 5 (04) : 394 - 408