论文标题
SOK:开源威胁模拟器的调查
SoK: A Survey of Open-Source Threat Emulators
论文作者
论文摘要
威胁模拟器是模仿网络攻击或恶意行为的工具或脚本集。它们可用于创建和启动单个过程攻击和多步攻击;最终的攻击可能是已知的或未知的网络攻击。使用威胁模拟器的动机各不相同,包括需要在组织中进行自动安全审核或减少红色团队的规模以降低笔测试成本;或者希望使用其武器库中的另一种工具为正在开发的安全工具或提供笔测试仪创建基线测试。在本文中,我们审查和比较各种开源威胁模拟器。我们专注于MITER&CK Enterprise Matrix的策略和技术,并确定是否可以使用模拟器进行和测试。我们开发了一种全面的方法,用于对威胁模拟器在一般特征(例如先决条件,攻击定义,清理等)方面进行定性和定量比较。最后,我们讨论了一个威胁模拟器比另一个威胁更喜欢的情况。这项调查可以帮助安全团队,安全开发人员和产品部署团队检查其网络环境或最合适的威胁模拟器的产品。使用提供的准则,团队可以选择最能满足其需求的威胁模拟器而无需评估所有这些需求。
Threat emulators are tools or sets of scripts that emulate cyber attacks or malicious behavior. They can be used to create and launch single procedure attacks and multi-step attacks; the resulting attacks may be known or unknown cyber attacks. The motivation for using threat emulators varies and includes the need to perform automated security audits in organizations or reduce the size of red teams in order to lower pen testing costs; or the desire to create baseline tests for security tools under development or supply pen testers with another tool in their arsenal. In this paper, we review and compare various open-source threat emulators. We focus on tactics and techniques from the MITRE ATT&CK Enterprise matrix and determine whether they can be performed and tested with the emulators. We develop a comprehensive methodology for our qualitative and quantitative comparison of threat emulators with respect to general features, such as prerequisites, attack definition, cleanup, and more. Finally, we discuss the circumstances in which one threat emulator is preferred over another. This survey can help security teams, security developers, and product deployment teams examine their network environment or products with the most suitable threat emulator. Using the guidelines provided, a team can select the threat emulator that best meets their needs without evaluating all of them.