论文标题
Pandora:用于安全测试和部署自动网络攻击工具的网络范围环境
Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools
论文作者
论文摘要
网络安全工具越来越多地具有人工智能(AI)功能,以匹配攻击的指数尺度,弥补培训新的网络安全才能相对较慢的速度,并提高工具和用户的准确性和性能。但是,自主网络攻击工具的安全和适当使用(尤其是在这些工具的开发阶段)仍然是一个未解决的差距。我们对当前文献和工具的调查表明,大多数现有的网络范围设计主要使用手动工具,并且没有考虑增加自动化工具或工具引起的潜在安全问题。换句话说,仍然有一个新型的网络范围设计的空间,该设计使安全研究人员可以安全地部署自主工具并在需要时执行自动化工具测试。在本文中,我们介绍了潘多拉(Pandora),这是一个安全的测试环境,它允许安全研究人员和网络范围用户对自动化的网络攻击工具进行实验,这些工具可能具有强大的使用潜力,同时又具有强大的风险潜力。与与企业计算机系统直接兼容的现有测试台和网络范围不同,并且在整个企业网络上具有风险传播的潜力,我们的测试系统的目的是故意与企业现实世界中计算系统不相容的,以减少攻击传播的风险,以减少攻击传播到实际基础设施中。我们的设计还提供了一种工具,可以将自动化的网络攻击工具转换为可执行的测试二进制文件,以验证和使用现实的企业系统环境。我们的实验测试了对拟议系统的自动攻击工具,以验证我们提出的环境的可用性。我们的实验还通过使用简单的恶意代码进行兼容测试证明了环境的安全性。
Cybersecurity tools are increasingly automated with artificial intelligent (AI) capabilities to match the exponential scale of attacks, compensate for the relatively slower rate of training new cybersecurity talents, and improve of the accuracy and performance of both tools and users. However, the safe and appropriate usage of autonomous cyber attack tools - especially at the development stages for these tools - is still largely an unaddressed gap. Our survey of current literature and tools showed that most of the existing cyber range designs are mostly using manual tools and have not considered augmenting automated tools or the potential security issues caused by the tools. In other words, there is still room for a novel cyber range design which allow security researchers to safely deploy autonomous tools and perform automated tool testing if needed. In this paper, we introduce Pandora, a safe testing environment which allows security researchers and cyber range users to perform experiments on automated cyber attack tools that may have strong potential of usage and at the same time, a strong potential for risks. Unlike existing testbeds and cyber ranges which have direct compatibility with enterprise computer systems and the potential for risk propagation across the enterprise network, our test system is intentionally designed to be incompatible with enterprise real-world computing systems to reduce the risk of attack propagation into actual infrastructure. Our design also provides a tool to convert in-development automated cyber attack tools into to executable test binaries for validation and usage realistic enterprise system environments if required. Our experiments tested automated attack tools on our proposed system to validate the usability of our proposed environment. Our experiments also proved the safety of our environment by compatibility testing using simple malicious code.