File:Developing simulated cyber attack scenarios against virtualized adversary networks (IA developingsimula1094552999).pdf
Original file (1,275 × 1,650 pixels, file size: 1.51 MB, MIME type: application/pdf, 104 pages)
Captions
Summary[edit]
Developing simulated cyber attack scenarios against virtualized adversary networks ( ) | |
---|---|
Author |
Aybar, Luis E. |
Title |
Developing simulated cyber attack scenarios against virtualized adversary networks |
Publisher |
Monterey, California: Naval Postgraduate School |
Description |
Cyberspace is now recognized as a critical center of gravity for modern military forces. The ability to maintain operational networks, while degrading the enemy's network capability, is a key consideration for military commanders. Conducting effective cyber-attacks against sophisticated adversaries requires the ability to develop, test, and refine cyber-attack scenarios before they are used operationally, a requirement that is not as well defined in the cyber domain as it is in the physical domain. This research introduces several concepts to address this need, and creates a prototype for cyber-attack scenario development and testing in a virtual test environment. Commercial and custom software tools that provide the ability to conduct network vulnerability testing are reviewed for their suitability as candidates for the framework of this project. Leveraging the extensible architecture of the Malicious Activity Simulation Tool (MAST) custom framework allowed for the implementation of new interaction parameters, and provided temporal specificity and target discrimination of cyber-attack scenario tests. The prototype successfully integrated a virtualized test environment used to simulate an adversary network and the enhanced MAST capability to demonstrate the viability of a cyber-attack scenario development platform to address the needs of modern offensive cyber operations. Based on these results, we recommend continued development of MAST with the intent to ultimately deploy to Department of Defense cyber operations teams. Subjects: offensive; malware; cyber; virtualization; attack; simulated; modeling; MAST; MAVNATT |
Language | English |
Publication date | March 2017 |
Current location |
IA Collections: navalpostgraduateschoollibrary; fedlink |
Accession number |
developingsimula1094552999 |
Source | |
Permission (Reusing this file) |
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. |
Licensing[edit]
Public domainPublic domainfalsefalse |
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
|
||
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 08:18, 17 July 2020 | 1,275 × 1,650, 104 pages (1.51 MB) | Fæ (talk | contribs) | FEDLINK - United States Federal Collection developingsimula1094552999 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #13719) |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title | Developing simulated cyber attack scenarios against virtualized adversary networks |
---|---|
Author | Aybar, Luis E. |
Software used | Aybar, Luis E. |
Conversion program | Acrobat Distiller 11.0 (Windows) |
Encrypted | no |
Page size | 612 x 792 pts (letter) |
Version of PDF format | 1.4 |