Show simple item record

dc.contributor.authorAybar, Luis
dc.contributor.authorSingh, Gurminder
dc.contributor.authorShaffer, Alan
dc.date8-9 March 2018
dc.date.accessioned2018-07-11T17:51:00Z
dc.date.available2018-07-11T17:51:00Z
dc.date.issued2018-03-08
dc.identifier.citationAybar, Luis, Gurminder Singh, and Alan Shaffer. "Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks." ICCWS 2018 13th International Conference on Cyber Warfare and Security. Academic Conferences and publishing limited, 2018.
dc.identifier.urihttps://hdl.handle.net/10945/59147
dc.descriptionProceedings of the 13th International Conference on Cyber Warfare and Security ICCWS 2018; Hosted By National Defense University, Washington DC, USA; 8 - 9 March 2018.en_US
dc.description.abstractCyberspace Is recognized as a critical domain In modern warfare. The ability of military forces to maintain and secure their own operational networks, while simultaneously degrading or denying the ability of adversaries to operate their networks, ls a critical strategic objective for military planners and leaders. Conducting effective offensive cyber operations (OCO) against sophisticated adversary networks requires the ability to develop, test, and rehearse cyber-attack actions before they are employed operationally. This requirement Is well understood and practiced In the physical warfare domains, where ships, aircraft and tanks can exercise their capabilities against physical targets; It Is not, however, well refined In the cyber domain. This research Introduces a framework to address this need, and demonstrates a prototype for cyber-attack scenario development and rehearsal In a virtual network environment. By extending the earlier work of the Naval Postgraduate School's Malicious Activity Simulation Tool (MAST), a distributed client-server based software tool designed to launch Inert malware attacks on live networks, we were able to demonstrate cyber-attack scenarios based on temporal specificity and target discrimination as attack parameters. Our prototype accurately models an adversary network In a virtual environment, providing the ability to develop cyber-attack actions to achieve specific cyber effects against hosts on the Intended target network. The architecture allows cyber forces to rehearse specific cyber actions prior to launching a cyberattack, In order to provide a more accurate assessment of the efficacy of these actions against a realistic model of the target network. This framework allows military forces to better train and prepare for cyber operations to help achieve cyber superiority In modern warfare.en_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleDeveloping Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networksen_US
dc.typeArticleen_US
dc.contributor.corporateNaval Postgraduate School (U.S.)en_US
dc.contributor.departmentCyber Acadamic Group (CAG)en_US
dc.subject.authoroffensive cyber operationsen_US
dc.subject.authorsimulated malwareen_US
dc.subject.authorcyber-attack rehearsalen_US
dc.subject.authorcyber effects developmenten_US
dc.subject.authorvlrtuallzed networksen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record