DOI QR코드

DOI QR Code

사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현

The Design and Implementation of Simulated Threat Generator based on MITRE ATT&CK for Cyber Warfare Training

  • 홍수연 (LIG넥스원(주) C4I연구소 9팀) ;
  • 김광수 (LIG넥스원(주) C4I연구소 9팀) ;
  • 김태규 (LIG넥스원(주) C4I연구소 9팀)
  • 투고 : 2019.09.02
  • 심사 : 2019.11.25
  • 발행 : 2019.12.05

초록

Threats targeting cyberspace are becoming more intelligent and increasing day by day. To cope with such cyber threats, it is essential to improve the coping ability of system security officers. In this paper, we propose a simulated threat generator that automatically generates cyber threats for cyber defense training. The proposed Simulated Threat Generator is designed with MITRE ATT & CK(Adversarial Tactics, Techniques and Common Knowledge) framework to easily add an evolving cyber threat and select the next threat based on the threat execution result.

키워드

참고문헌

  1. Myung Kil Ahn, Yong Hyun Kim, "Research on System Architecture and Simulation Environment for Cyber Warrior Training," Journal of the Korea Institute of Information Security & Cryptology, Vol. 26, No. 2, pp. 533-540, 2016. https://doi.org/10.13089/JKIISC.2016.26.2.533
  2. B. Ferguson, A. Tall, and D. Olsen, "National Cyber Range Overview," Proceedings of the 2014 IEEE Military Communications Conference, MILCOM '14, pp. 123-128, Oct. 2014.
  3. T. Bonaci and J. Herron and T. YusufTo, "Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics," National Science Foundation, CNS-1329751, pp. 1-11, May 2015.
  4. SHIVAYOGIMATH, Chaitra N., "An Overview of Network Penetration Testing," International Journal of Research in Engineering and Technology, Vol. 3, No. 3, pp. 408-413, 2014.
  5. Rossey, L. M., Cunningham, R. K., Fried, D. J., Rabek, J. C., Lippmann, R. P., Haines, J. W., & Zissman, M. A. "Lariat: Lincoln Adaptable Real-Time Information Assurance Testbed," In Proceedings, IEEE Aerospace Conference Vol. 6, pp. 6-6, March, 2002.
  6. Applebaum, A., Miller, D., Strom, B., Korban, C., & Wolf, R. "Intelligent, Automated Red Team Emulation," In Proceedings of the 32nd Annual Conference on Computer Security Applications, ACM, pp. 363-373, December, 2016.
  7. Strom, B. E., Applebaum, A., Miller, D. P., Nickels, K. C., Pennington, A. G., & Thomas, C. B., "MITRE $ATT&CK^{TM}$: Design and Philosophy," Technical Report, 2018.
  8. Len Bass, Paul Clements, Rick Kazman, "Software Architecture in Practice," Addison-Wesley Professional, America, 2012.
  9. Lloyd Wihl, "Training for the Combined Cyber / Kinetic Battlefield," In Proceedings of MODSIM World 2015. No. 9, pp. 1-11, March, 2015.