论文标题

Harmer:网络攻击自动化和评估

HARMer: Cyber-attacks Automation and Evaluation

论文作者

Enoch, Simon Yusuf, Huang, Zhibin, Moon, Chun Yong, Lee, Donghwan, Ahn, Myung Kil, Kim, Dong Seong

论文摘要

随着网络攻击事件的增长的增加,重要的是开发创新有效的技术来评估和捍卫网络系统免受网络攻击。众所周知的技术之一是执行渗透测试,该测试由一组安全专业人员(即红色团队)进行。众所周知,渗透测试对于发现现有漏洞和新漏洞是有效的,但是,安全评估的质量可以取决于红色团队成员的质量以及他们对渗透测试的时间和精力。在本文中,我们提出了一个名为“ Harmer”的网络攻击一代的新颖自动化框架,以应对红色团队的手动攻击执行方面的挑战。我们的新颖提议的框架,设计和实施基于一个可扩展的图形安全模型,称为层次攻击表示模型(HARM)。 (1)我们提出了自动化框架的要求和关键阶段。 (2)我们建议基于安全指标的攻击计划策略及其算法。 (3)我们在真实的企业网络和亚马逊Web服务中进行实验。结果显示了框架的不同阶段如何相互作用以建模攻击者的操作。该框架将允许安全管理员自动评估各种威胁和攻击的影响。

With the increasing growth of cyber-attack incidences, it is important to develop innovative and effective techniques to assess and defend networked systems against cyber attacks. One of the well-known techniques for this is performing penetration testing which is carried by a group of security professionals (i.e, red team). Penetration testing is also known to be effective to find existing and new vulnerabilities, however, the quality of security assessment can be depending on the quality of the red team members and their time and devotion to the penetration testing. In this paper, we propose a novel automation framework for cyber-attacks generation named `HARMer' to address the challenges with respect to manual attack execution by the red team. Our novel proposed framework, design, and implementation is based on a scalable graphical security model called Hierarchical Attack Representation Model (HARM). (1) We propose the requirements and the key phases for the automation framework. (2) We propose security metrics-based attack planning strategies along with their algorithms. (3) We conduct experiments in a real enterprise network and Amazon Web Services. The results show how the different phases of the framework interact to model the attackers' operations. This framework will allow security administrators to automatically assess the impact of various threats and attacks in an automated manner.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源