Visible to the public Intelligent, Automated Red Team Emulation

TitleIntelligent, Automated Red Team Emulation
Publication TypeConference Paper
Year of Publication2016
AuthorsApplebaum, Andy, Miller, Doug, Strom, Blake, Korban, Chris, Wolf, Ross
Conference NameProceedings of the 32Nd Annual Conference on Computer Security Applications
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4771-6
Keywordsadvanced persistent threat, advanced persistent threats, automated planning, Collaboration, composability, formal methods in security, Human Behavior, Metrics, Network security, Penetration Testing, pubcrawl, red teaming, Resiliency, Scalability
Abstract

Red teams play a critical part in assessing the security of a network by actively probing it for weakness and vulnerabilities. Unlike penetration testing - which is typically focused on exploiting vulnerabilities - red teams assess the entire state of a network by emulating real adversaries, including their techniques, tactics, procedures, and goals. Unfortunately, deploying red teams is prohibitive: cost, repeatability, and expertise all make it difficult to consistently employ red team tests. We seek to solve this problem by creating a framework for automated red team emulation, focused on what the red team does post-compromise - i.e., after the perimeter has been breached. Here, our program acts as an automated and intelligent red team, actively moving through the target network to test for weaknesses and train defenders. At its core, our framework uses an automated planner designed to accurately reason about future plans in the face of the vast amount of uncertainty in red teaming scenarios. Our solution is custom-developed, built on a logical encoding of the cyber environment and adversary profiles, using techniques from classical planning, Markov decision processes, and Monte Carlo simulations. In this paper, we report on the development of our framework, focusing on our planning system. We have successfully validated our planner against other techniques via a custom simulation. Our tool itself has successfully been deployed to identify vulnerabilities and is currently used to train defending blue teams.

URLhttp://doi.acm.org/10.1145/2991079.2991111
DOI10.1145/2991079.2991111
Citation Keyapplebaum_intelligent_2016