SoK: A Survey of Open Source Threat Emulators

03/03/2020
by   Sunders Bruskin, et al.
0

Threat emulators are tools or sets of scripts that emulate cyber-attacks or malicious behavior. Specifically, threat emulators can launch single procedure attacks or give one the ability to create multi-step attacks, while the resulting attacks may be known or unknown cyber-attacks. The motivations for using threat emulators are various: cutting costs of penetration testing activities by having smaller red teams, performing automated security audits in organizations, creating baseline tests for security tools in development, supplying penetration testers with another tool in their arsenal, etc. In this paper, we review various open-source threat emulators and perform qualitative and quantitative comparison between them. We focus on tactics and techniques from MITRE ATT CK matrix, and check if they can be performed and tested with the reviewed emulators. We develop a comprehensive methodology for the evaluation and comparison of threat emulators with respect to general features such as prerequisites, attack manipulation, clean up and more. Finally, we present a discussion on the circumstances in which one threat emulator should be preferred over another. This survey can help security teams, security developers and product deployment teams to examine their network environment or their product with the most suitable threat emulator. Using the provided guidelines, a team can choose the best threat emulator for their needs without checking and trying them all. To the best of our knowledge, no academic comparison was made between threat emulators.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/10/2022

A systematic literature review on cyber threat hunting

Since the term "Cyber threat hunting" was introduced in 2016, there have...
research
03/11/2020

Passlab: A Password Security Tool for the Blue Team

If we wish to compromise some password-protected system as an attacker (...
research
10/13/2020

The Vacuity of the Open Source Security Testing Methodology Manual

The Open Source Security Testing Methodology Manual (OSSTMM) provides a ...
research
06/27/2022

Measuring and Clustering Network Attackers using Medium-Interaction Honeypots

Network honeypots are often used by information security teams to measur...
research
09/01/2018

Insider Threat Detection Through Attributed Graph Clustering

While most organizations continue to invest in traditional network defen...
research
09/22/2021

An Investigation And Insight Into Terrorism In Nigeria

Terrorism is one of the most serious life-challenging threat facing huma...
research
07/10/2021

Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends

The integration of Information and Communication Technology (ICT) tools ...

Please sign up or login with your details

Forgot password? Click here to reset