MITRE 自动化对手模拟:一个计划和行动与未知的情况2018年(9页)

ID:22810

大小:0.30 MB

页数:9页

时间:2022-11-28

金币:15

上传者:战必胜
Automated Adversary Emulation: A Case for Planning and Acting with
Unknowns
Doug Miller, Ron Alford, Andy Applebaum, Henry Foster, Caleb Little, and Blake Strom
The MITRE Corporation
7515 Colshire Drive
McLean, Virginia 22102
{dpmiller, ralford, aapplebaum, hfoster, clittle, bstrom}@mitre.org
Abstract
Adversary emulation assessments offer defenders the
ability to view their networks from the point of view of
an adversary. Because these assessments are time con-
suming, there has been recent interest in the automated
planning community on using planning to create solu-
tions for an automated adversary to follow. We devi-
ate from existing research, and instead argue that auto-
mated adversary emulation as well as automated pene-
tration testing should be treated as both a planning and
an acting problem. Our argument hinges on the fact that
adversaries typically have to manage unbounded un-
certainty during assessments, which many of the prior
techniques do not consider. To illustrate this, we pro-
vide examples and a formalism of the problem, and dis-
cuss shortcomings in existing planning modeling lan-
guages when representing this domain. Additionally,
we describe our experiences developing solutions to this
problem, including our own custom representation and
algorithms. Our work helps characterize the nature of
problems in this space, and lays important groundwork
for future research.
Introduction
To best understand the security of their systems, network
defenders often use offensive testing techniques and assess-
ments. These types of assessments come in many forms,
ranging from penetration tests where a team of “white
hats” probe the network to identify weaknesses and vulner-
abilities to full-scale red team or even adversary emula-
tion exercises, wherein a team fully emulates an adversary,
beginning with reconnaissance, tool and infrastructure de-
velopment, and initial compromise, and only ending when
they reach the specified adversary’s goals. As opposed to
pure defensive analysis, offensive testing can provide con-
crete measures of the security of a network by illustrating
real attack paths that an adversary could take.
While offensive testing has clear benefits for defenders,
it can be difficult for them to actually employ: these tests
can be increasingly costly, time-consuming, and personnel
constrained. In lieu of easy-to-access offensive testing, an
emerging trend in the security community is to launch au-
tomated offensive assessments. Tools in this space range
Copyright
c
2018, The MITRE Corporation. All rights reserved.
Approved for public release. Distribution unlimited 18-0944-1.
in capability, from those that focus on technique execution
(Smith, Casey 2017) to those that seek to fully emulate an
adversary by engaging the full post-compromise adversary
life-cycle (Applebaum et al. 2016).
Similarly, the automated planning community has re-
cently taken an interest in security assessments and tests.
(Bozic and Wotawa 2017) identify the natural application
of automated planning to security: attacks are typically de-
scribed as a sequence of steps that ultimately achieve a goal,
similar in many ways to a plan. They argue that by using
automated planning, we can construct tests that we can run
against our systems that can identify weaknesses; the au-
thors specifically identify how planning can be used to as-
sess web applications (e.g., SQL injection) as well as the
SSL/TLS protocol. Other recent applications include using
automated planning and plan recognition to identify larger
attack paths (Amos-Binks et al. 2017) as well as vulnerabil-
ity assessment (Khan and Parkinson 2017).
More specific to offensive testing is the line of work dedi-
cated towards using automated planning specifically for pen-
etration tests. Obes, Sarraute, and Richarte (2010) present
a model that leverages a deterministic planner alongside a
domain description of exploits and connectivity to diagram
paths that adversaries could take. Followup work in Sar-
raute, Buffet, and Hoffmann (2012) expands the model by
adding in uncertainty – leaving the core security domain the
same and now using a Partially Observable Markov De-
cision Process (POMDP) to solve the problem. Shmaryahu
et al. (2017) would later acknowledge this POMDP model’s
success and accuracy, but note its shortcomings mainly
in time-to-compute – as a motivation for using partially ob-
servable contingent planning, an approach they argue lies
between that of full-knowledge classical planning and multi-
belief POMDPs.
Recognizing the wide array of work on automated plan-
ning for penetration testing, Hoffman (2015) offers a survey
of the literature where he identifies the two main dimensions
of existing research: how the approach handles uncertainty
from the point of view of the adversary, and how the at-
tack components interact with each other. Hoffman similarly
enumerates eight key assumptions, and surveys the literature
mapping each to its appropriate assumptions as well as how
the approach maps to the two dimensions he identifies.
Despite all of the work dedicated to using automated plan-
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭