DACA: Automated Attack Scenarios and Dataset Generation

被引:0
|
作者
Korving, Frank [1 ]
Vaarandi, Risto [1 ]
机构
[1] Tallinn Univ Technol, Ctr Digital Forens & Cyber Secur, Tallinn, Estonia
关键词
security dataset; testbed; DevOps; detection engineering;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Computer networks and systems are under an ever-increasing risk of being attacked and abused. High-quality datasets can assist with in-depth analysis of attack scenarios, improve detection rules, and help educate analysts. However, existing solutions for creating such datasets suffer from a number of drawbacks. First, several solutions are not open source with publicly released implementations or are not vendor neutral. Second, some existing solutions neglect the complexity and variance of specific attack techniques when creating datasets or neglect certain attack types. Third, existing solutions are not fully automating the entire data collection pipeline. This paper presents and discusses the Dataset Creation and Acquisition Engine (DACA), a configurable dataset generation testbed, built around commonly used Infrastructure-as-Code (IaC) and DevOps tooling which can be used to create varied, reproducible datasets in a highly automated fashion. DACA acts as a versatile wrapper around existing virtualization technologies and can be used by blue as well as red teamers alike to run attack scenarios and generate datasets. These in turn can be used for tuning detection rules, for educational purposes or pushed into data processing pipelines for further analysis. To show DACA's effectiveness, DACA is used to create two extensive datasets examining covert DNS Tunnelling activity on which a detailed analysis is performed.
引用
收藏
页码:550 / 558
页数:9
相关论文
共 50 条
  • [21] Generation of attack scenarios by modeling CSP for Evaluating and Testing Intrusion Detection System
    Saber, Mohammed
    Bouchentouf, Toumi
    Belkasmi, Mohammed Ghaouth
    Benazzi, Abdelhamid
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 93 - 98
  • [22] Automated generation of product use case scenarios in product line development
    Choi, Woo-seok
    Kang, Sungwon
    Choi, Hojin
    Baik, Jongmoon
    2008 IEEE 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2008, : 760 - 765
  • [23] Automated Generation of Erotetic Search Scenarios: Classification, Optimization, and Knowledge Extraction
    Chlebowski, Szymon
    Komosinski, Maciej
    Kups, Adam
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2017, 18 (02)
  • [24] Generation Method for Anthropomorphic Continuous Interactive Test Scenarios of Automated Driving
    Zhu, Bing
    Fan, Tianxin
    Zhao, Jian
    Zhang, Peixing
    Song, Dongjian
    Xue, Yue
    Zhao, Wenbo
    Qiche Gongcheng/Automotive Engineering, 2024, 46 (09): : 1600 - 1607
  • [25] VoIP Malware: Attack Tool & Attack Scenarios
    Nassar, Mohamed
    State, Radu
    Festor, Olivier
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 808 - 813
  • [26] GUI-Squatting Attack: Automated Generation of Android Phishing Apps
    Chen, Sen
    Fan, Lingling
    Chen, Chunyang
    Xue, Minhui
    Liu, Yang
    Xu, Lihua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (06) : 2551 - 2568
  • [27] Unleashing offensive artificial intelligence: Automated attack technique code generation
    Iturbe, Eider
    Llorente-Vazquez, Oscar
    Rego, Angel
    Rios, Erkuden
    Toledo, Nerea
    COMPUTERS & SECURITY, 2024, 147
  • [28] Automated cyber-attack scenario generation using the symbolic simulation
    Lee, JK
    Lee, MW
    Lee, JS
    Chi, SD
    Ohn, SY
    ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 380 - 389
  • [29] ACCURIFY: Automated New Testflows Generation for Attack Variants in Threat Hunting
    Nour, Boubakr
    Pourzandi, Makan
    Qureshi, Rushaan Kamran
    Debbabi, Mourad
    FOUNDATIONS AND PRACTICE OF SECURITY, PT II, FPS 2023, 2024, 14552 : 52 - 69
  • [30] Pipeline and dataset generation for automated fact-checking in almost any language
    Drchal, Jan
    Ullrich, Herbert
    Mlynář, Tomáš
    Moravec, Václav
    Neural Computing and Applications, 2024, 36 (30) : 19023 - 19054