Developing simulated cyber attack scenarios against virtualized adversary networks

Download
Author
Aybar, Luis E.
Date
2017-03Advisor
Shaffer, Alan
Singh, Gurminder
Metadata
Show full item recordAbstract
Cyberspace is now recognized as a critical center of gravity for modern military forces. The ability to maintain operational networks, while degrading the enemy's network capability, is a key consideration for military commanders. Conducting effective cyber-attacks against sophisticated adversaries requires the ability to develop, test, and refine cyber-attack scenarios before they are used operationally, a requirement that is not as well defined in the cyber domain as it is in the physical domain. This research introduces several concepts to address this need, and creates a prototype for cyber-attack scenario development and testing in a virtual test environment. Commercial and custom software tools that provide the ability to conduct network vulnerability testing are reviewed for their suitability as candidates for the framework of this project. Leveraging the extensible architecture of the Malicious Activity Simulation Tool (MAST) custom framework allowed for the implementation of new interaction parameters, and provided temporal specificity and target discrimination of cyber-attack scenario tests. The prototype successfully integrated a virtualized test environment used to simulate an adversary network and the enhanced MAST capability to demonstrate the viability of a cyber-attack scenario development platform to address the needs of modern offensive cyber operations. Based on these results, we recommend continued development of MAST with the intent to ultimately deploy to Department of Defense cyber operations teams.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Related items
Showing items related by title, author, creator and subject.
-
Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks
Aybar, Luis; Singh, Gurminder; Shaffer, Alan (2018-03-08);Cyberspace Is recognized as a critical domain In modern warfare. The ability of military forces to maintain and secure their own operational networks, while simultaneously degrading or denying the ability of adversaries ... -
Optimal Patrol to Uncover Threats in Time When Detection Is Imperfect
Lin, Kyle Y.; Atkinson, Michael; Glazebrook, Kevin D. (2013-08-12);This paper considers a patrol problem, where a patroller traverses a graph through edges to detect potential attacks at nodes. Attackers arrive at each node according to independent Poisson processes and take a random ... -
Eliminating the lost time interval of law enforcement to active shooter events in schools
Ausdemore, Steven E. (Monterey, California: Naval Postgraduate School, 2015-09);The Newtown Connecticut school attack at the Sandy Hook elementary school on December 14, 2012, was another example of the tragedy of mass murder. When a targeted attack occurs, the victims must await the arrival of law ...