TY - GEN
T1 - Methodology for Automating Attacking Agents in Cyber Range Training Platforms
AU - Sánchez, Pablo Martínez
AU - Nespoli, Pantaleone
AU - Alfaro, Joaquín García
AU - Mármol, Félix Gómez
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
PY - 2024/1/1
Y1 - 2024/1/1
N2 - The world faces cyberattacks daily and the targets of these attacks are often critical infrastructure, including the healthcare sector. In addition, more than half of cybersecurity professionals lack the necessary knowledge to deploy the relevant countermeasures to these attacks. In this regard, there is no doubt that education and training in cybersecurity are essential to defend technological assets. That is why, in this context, it is easy to understand that Cyber Ranges play a crucial role since these tools provide the user with a hyper-realistic experience for quality training. Thanks to attack simulators, commonly Advanced Persistent Threats (APT) generators, those realistic defensive cyberexercises can be performed. To implement these components, a behavioral matrix is needed, marking the different stages used by a cybersecurity expert during an attack, e.g. reconnaissance, explotation, data exfiltration, etc. Since bringing the current methodologies to a hyper-realistic production environment is an inordinate challenge, a novel matrix will be designed from simulation environments for training. This new methodology will compact dependent phases and simplify similar stages to automatically. Furthermore, the contribution contains a logic that increases the reality of the attacks. Finally, a proof of concept is made to evaluate the purposes the contribution purses.
AB - The world faces cyberattacks daily and the targets of these attacks are often critical infrastructure, including the healthcare sector. In addition, more than half of cybersecurity professionals lack the necessary knowledge to deploy the relevant countermeasures to these attacks. In this regard, there is no doubt that education and training in cybersecurity are essential to defend technological assets. That is why, in this context, it is easy to understand that Cyber Ranges play a crucial role since these tools provide the user with a hyper-realistic experience for quality training. Thanks to attack simulators, commonly Advanced Persistent Threats (APT) generators, those realistic defensive cyberexercises can be performed. To implement these components, a behavioral matrix is needed, marking the different stages used by a cybersecurity expert during an attack, e.g. reconnaissance, explotation, data exfiltration, etc. Since bringing the current methodologies to a hyper-realistic production environment is an inordinate challenge, a novel matrix will be designed from simulation environments for training. This new methodology will compact dependent phases and simplify similar stages to automatically. Furthermore, the contribution contains a logic that increases the reality of the attacks. Finally, a proof of concept is made to evaluate the purposes the contribution purses.
KW - Advanced Persistent Threat
KW - Attack methodology
KW - Critical Infrastructure
KW - Cyber Range
KW - Cybersecurity
U2 - 10.1007/978-3-031-55829-0_6
DO - 10.1007/978-3-031-55829-0_6
M3 - Conference contribution
AN - SCOPUS:85189546199
SN - 9783031558283
T3 - Communications in Computer and Information Science
SP - 90
EP - 109
BT - Secure and Resilient Digital Transformation of Healthcare - 1st Workshop, SUNRISE 2023, Proceedings
A2 - Abie, Habtamu
A2 - Pirbhulal, Sandeep
A2 - Gkioulos, Vasileios
A2 - Katsikas, Sokratis
PB - Springer Science and Business Media Deutschland GmbH
T2 - 1st International Workshop on Secure and Resilient Digital Transformation of Healthcare, SUNRISE 2023
Y2 - 30 November 2023 through 30 November 2023
ER -