2021
DOI: 10.1109/access.2021.3104260
|View full text |Cite
|
Sign up to set email alerts
|

Offensive Security: Towards Proactive Threat Hunting via Adversary Emulation

Abstract: Attackers increasingly seek to compromise organizations' systems and data with advanced methods, often utilising legitimate tools. In the main, organisations employ reactive approaches to cyber security, focused on rectifying immediate incidents and preventing repeat attacks, through protections such as Security Information and Event Management (SIEM), firewalls, anti-spam/anti-malware solutions and system patches have been demonstrated to have significant weaknesses in addressing modern attacks. Proactive app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(21 citation statements)
references
References 22 publications
0
11
0
1
Order By: Relevance
“…This then leads to providing the right solution/recommendation to the blue teams/organizations. 14,15 CALDERA can also be utilized to test endpoint security arrangements and evaluate a network's security capability to withstand the common post-compromise, antagonistic strategies contained within the ATT&CK approach. 14 CALDERA leverages the ATT&CK approach to distinguish and imitate enemy behaviors as if a genuine interruption is happening.…”
Section: Open Peer Reviewmentioning
confidence: 99%
“…This then leads to providing the right solution/recommendation to the blue teams/organizations. 14,15 CALDERA can also be utilized to test endpoint security arrangements and evaluate a network's security capability to withstand the common post-compromise, antagonistic strategies contained within the ATT&CK approach. 14 CALDERA leverages the ATT&CK approach to distinguish and imitate enemy behaviors as if a genuine interruption is happening.…”
Section: Open Peer Reviewmentioning
confidence: 99%
“…Hypothesis development focuses on the type of hypothesis. According to the SANS Institute, the definition of a hypothesis is based on intelligence, domain knowledge, and situational awareness (Ajmal et al, 2021). Intelligence-based assumptions come from an understanding of the attacker's tactics, techniques, and procedures (TTPs), and behaviors.…”
Section: Hypotheses Developmentmentioning
confidence: 99%
“…To track threats with particular attention to certain attackers, it is required to improve the accuracy of the threat intelligence. Threat intelligence informs threat hunters of content that can be detected by a particular attacker's TTP (Ajmal et al, 2021).…”
Section: Hypotheses Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…The use of this approach help organizations to discover advanced attack mechanisms and measure their ability to detect attacks [103]. As opposed to traditional approaches that emphasize on identified threats including vulnerability assessment and penetration testing, new unknown threats can be identified and addressed with this method [104].…”
Section: Threat Emulationmentioning
confidence: 99%