2020
DOI: 10.48550/arxiv.2003.01518
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

SoK: A Survey of Open-Source Threat Emulators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(12 citation statements)
references
References 0 publications
0
10
0
Order By: Relevance
“…To address this issue, many solutions known as Automated threat emulators have been proposed. Zilberman et al [33] carried out an exhaustive analysis of the most popular threat emulators, ranked according to several criteria, e.g. coverage of the MITRE ATT&CK Enterprise Matrix [21].…”
Section: Actor Simulation Through Ai Techniquesmentioning
confidence: 99%
“…To address this issue, many solutions known as Automated threat emulators have been proposed. Zilberman et al [33] carried out an exhaustive analysis of the most popular threat emulators, ranked according to several criteria, e.g. coverage of the MITRE ATT&CK Enterprise Matrix [21].…”
Section: Actor Simulation Through Ai Techniquesmentioning
confidence: 99%
“…Adversary emulation is usually exercised in virtualized environments (cyber-ranges) and, in general, it encompasses time-consuming activities that engage human personnel (red teams). Several tools aim to automate adversary emulation [67], which offer automated procedures that implement APT techniques, as learned from threat intelligence sources. These tools typically automate actions for information gathering, lateral movement across hosts, connections to command-andcontrol servers, and privilege escalation.…”
Section: Introductionmentioning
confidence: 99%
“…In this work, we investigate a novel solution for adversary emulation with anti-detection capabilities, to avoid the previously mentioned "cat-and-mouse" game. We tested stateof-the-art solutions for adversary emulation (MITRE CALDERA [67] , Atomic Red Team [51], Invoke-Adversary [13]) and for antidetection (Inceptor [29]) against multiple AV/EDR products. We found that several malicious actions (and even the installation of the emulation agent) cannot evade detection, thus limiting the realism of emulated attacks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations