URSID: Using formalism to Refine attack Scenarios for vulnerable Infrastructure Deployment

03/30/2023
by   Pierre-Victor Besson, et al.
0

In this paper we propose a novel way of deploying vulnerable architectures for defense and research purposes, which aims to generate deception platforms based on the formal description of a scenario. An attack scenario is described by an attack graph in which transitions are labeled by ATT CK techniques or procedures. The state of the attacker is modeled as a set of secrets he acquires and a set of nodes he controls. Descriptions of a single scenario on a technical level can then be declined into several different scenarios on a procedural level, and each of these scenarios can be deployed into its own vulnerable architecture. To achieve this goal we introduce the notion of architecture constraints, as some procedures may only be exploited on system presenting special properties, such as having a specific operating system version. Finally, we present our deployment process for converting one of these scenarios into a vulnerable infrastructure, and offer an online proof of concept demonstration of our tool, where readers may deploy locally deploy a complete scenario inspired by the threat actor APT-29.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/18/2020

Automating the Generation of Cyber Range Virtual Scenarios with VSDL

A cyber range is an environment used for training security experts and t...
research
12/12/2012

Formalizing Scenario Analysis

We propose a formal treatment of scenarios in the context of a dialectic...
research
03/16/2018

SDN for End-Nodes: Scenario Analysis and Architectural Guidelines

The advent of SDN has brought a plethora of new architectures and contro...
research
06/28/2022

Reasoning about Moving Target Defense in Attack Modeling Formalisms

Since 2009, Moving Target Defense (MTD) has become a new paradigm of def...
research
03/12/2018

Dfuntest: A Testing Framework for Distributed Applications

New ideas in distributed systems (algorithms or protocols) are commonly ...
research
08/11/2021

Cybersecurity Incident Response in Organisations: A Meta-level Framework for Scenario-based Training

Cybersecurity incident response teams mitigate the impact of adverse cyb...

Please sign up or login with your details

Forgot password? Click here to reset