Skip to main content

URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14551))

Included in the following conference series:

  • 64 Accesses

Abstract

Contrary to intuition, insecure computer network architectures are valuable assets in IT security. Indeed, such architectures (referred to as cyber-ranges) are commonly used to train red teams and test security solutions, in particular ones related to supervision security. Unfortunately, the design and deployment of these cyber-ranges is costly, as they require designing an attack scenario from scratch and then implementing it in an architecture on a case-by-case basis, through manual choices of machines/users, OS versions, available services and configuration choices. This article presents URSID, a framework for automatic deployment of cyber-ranges based on the formal description of attack scenarios. The scenario is described at the technical attack level according to the MITRE nomenclature, refined into several variations (instances) at the procedural level and then deployed in virtual multiple architectures. URSID thus automates costly manual tasks and allows to have several instances of the same scenario on architectures with different OS, software or account configurations. URSID has been successfully tested in an academic cyber attack and defense training exercise.

P.-V. Besson is funded by the Direction Générale de l’Armement (CREACH LABS).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    We are here using the official MITRE numerotation for techniques.

  2. 2.

    We throughout this work will refer to the attacker’s machine as Attacker and consider they have complete control of it.

References

  1. Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 217-224. CCS ’02, Association for Computing Machinery, New York, NY, USA (2002). https://doi.org/10.1145/586110.586140, https://doi.org/10.1145/586110.586140

  2. BESSON, P.V.: Ursid repository (2023). https://gitlab.inria.fr/pibesson/ursid-final

  3. Besson, P.V., et al.: CERBERE: cybersecurity exercise for red and blue team entertainment, reproducibility. In: CyberHunt 2023 - 6th Annual Workshop on Cyber Threat Intelligence and Hunting. IEEE Computer Society, Sorrento, Italy (Dec 2023). https://centralesupelec.hal.science/hal-04285565

  4. Corporation, O.: Virtualbox (2005). https://www.virtualbox.org/

  5. Costa, G., Russo, E., Armando, A.: Automating the generation of cyber range virtual scenarios with VSDL. J. Wirel. Mobile Netw., Ubiquit. Comput., Dependable Appl. 13(4), 61–80 (dec 2022). https://doi.org/10.58346/jowua.2022.i4.004, https://doi.org/10.58346

  6. FBI: Internet crime report 2021 (2021). https://www.ic3.gov/Media/PDF/AnnualReport/2021_IC3Report.pdf

  7. HashiCorp: Vagrant (2010). https://www.vagrantup.com/

  8. Hat, R.: Cve-2019-14287 (2019). https://access.redhat.com/security/cve/cve-2019-14287

  9. Hemberg, E., et al.: Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting (2021)

    Google Scholar 

  10. HQ, S.: Generic signature format for siem systems (2017). https://github.com/SigmaHQ/sigma

  11. Inc, A.: Ansible (2012). https://www.ansible.com/

  12. Mensah, P.: Generation and Dynamic Update of Attack Graphs in Cloud Providers Infrastructures. Ph.D. thesis, CentraleSupélec, Châtenay-Malabry, France (2019). https://tel.archives-ouvertes.fr/tel-02416305

  13. MITRE: The mitre att &ck matrix for enterprise (2018). https://attack.mitre.org/matrices/enterprise//

  14. MITRE: Apt29 adversary emulation (2021). https://github.com/center-for-threat-informed-defense/adversary_emulation_library/tree/master/apt29

  15. NIST: Cyber ranges (2018). https://www.nist.gov/system/files/documents/2018/02/13/cyber_ranges.pdf

  16. NIST: Cve-2021-4034 detail (2021). https://nvd.nist.gov/vuln/detail/cve-2021-4034

  17. Outkin, A.V., Schulz, P.V., Schulz, T., Tarman, T.D., Pinar, A.: Defender policy evaluation and resource allocation using mitre attck evaluations data (2021)

    Google Scholar 

  18. Russo, E., Costa, G., Armando, A.: Scenario design and validation for next generation cyber ranges. In: 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA), pp. 1–4 (2018). https://doi.org/10.1109/NCA.2018.8548324

  19. Schreuders, C.: Security scenario generator (secgen). https://github.com/cliffe/secgen (2017), https://github.com/cliffe/SecGen

  20. Sharma, Y., Birnbach, S., Martinovic, I.: Radar: A ttp-based extensible, explainable, and effective system for network traffic analysis and malware detection (2023)

    Google Scholar 

  21. Venkatesan, S., et al.: Vulnervan: A vulnerable network generation tool. In: MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), pp. 1–6 (2019). https://doi.org/10.1109/MILCOM47813.2019.9021013

  22. Yamin, M.M., Katt, B.: Modeling and executing cyber security exercise scenarios in cyber ranges. Comput. Secur. 116, 102635 (2022). https://doi.org/10.1016/j.cose.2022.102635, https://www.sciencedirect.com/science/article/pii/S0167404822000347

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pierre-Victor Besson .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Besson, PV., Tong, V.V.T., Guette, G., Piolle, G., Abgrall, E. (2024). URSID: Automatically Refining a Single Attack Scenario into Multiple Cyber Range Architectures. In: Mosbah, M., Sèdes, F., Tawbi, N., Ahmed, T., Boulahia-Cuppens, N., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2023. Lecture Notes in Computer Science, vol 14551. Springer, Cham. https://doi.org/10.1007/978-3-031-57537-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-57537-2_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-57536-5

  • Online ISBN: 978-3-031-57537-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics