Test and evaluation of the Malicious Activity Simulation Tool (MAST) in a Local Area Network (LAN) running the Common PC Operating System Environment (COMPOSE)
Littlejohn, Aaron M.
MetadataShow full item record
In the Department of the Navys layered defense approach to protecting a computer network, it is the networks administrators who provide the last layer of defense before the end user. Training network administrators is a rather expensive and time consuming process. However, this training needs to be provided on a regular basis in order to refresh their readiness and to train them to respond to new, emerging threats. Malicious Activity Simulation Tool (MAST) aims to provide realistic, tailored simulation of malicious activity for the purpose of training network administrators to recognize and respond to threats on the network they manage. In a continuation of MAST development, this thesis reports the testing and evaluation of the MAST functionality on a Local Area Network (LAN) using a Common PC Operating System Environment (COMPOSE) as its network operating system. We conclude that MAST can present realistic simulations of malicious activity that could be detected, recognized, and responded to by network administrators and host network, while posing no threat to the operational readiness of the host network or its supported missions.
APPLIED CYBER OPERATIONS CAPSTONE PROJECT REPORT
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Hayes, Nathaniel J. (Monterey, California. Naval Postgraduate School, 2013-03);The threat of degradation or disruption from cyber infiltration, espionage, and theft to militarily and nationally critical information and network systems poses a significant challenge to DoD and DON. To mitigate this ...
Farber, Adam M.; Rawls, Robert A. (Monterey, California: Naval Postgraduate School, 2015-09);With its ever-increasing reliance upon computers and networks in all facets of operation and administration, the U.S. military is becoming increasingly vulnerable to computer and network-based threats. Military technicians’ ...
Salazar, Daniel (Monterey, CA; Naval Postgraduate School, 2018-06);This research examines the use of machine-learning techniques to identify malicious traffic in an emulated tactical computer network. The intent is to identify low-cost solutions based on open-source software capable of ...