Digitala Vetenskapliga Arkivet

Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Evaluating the Realism and Effectiveness of Automated APT Emulation in Cybersecurity Training: A Lore Case Study
KTH, School of Electrical Engineering and Computer Science (EECS).
2024 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesisAlternative title
Utvärdering av realismen och effektiviteten av automatiserad APT-emulering i cybersäkerhetsutbildning : En fallstudie av Lore (Swedish)
Abstract [en]

This thesis investigates the effectiveness and realism of automated Advanced Persistent Threat (APT) emulation in cybersecurity training using the red team automation tool Lore as a case study. With increasing complexity in cybersecurity threats, realistic threat emulation tools offer an opportunity to improve defense preparedness. The research focuses on adapting Lore to simulate real-world APT behaviors by integrating a detailed emulation plan based on the tactics, techniques, and procedures (TTPs) of APT29, leveraging the MITRE ATT&CK framework. Through a series of controlled experiments in a simulated environment, this study assesses the feasibility of implementing these TTPs in Lore and evaluates the realism of the emulations based on expert feedback. The implementation feasibility is measured by assessing the percentage of successfully executed steps from the emulation plan and the accuracy of the implemented TTPs in replicating real-world attacker behaviors. Realism is further evaluated through expert interviews, where cybersecurity professionals provide qualitative ratings on the fidelity and educational value of the simulations. The findings highlight the challenges in translating APT profiles into automated tools and reveal that, while Lore demonstrates high configurability, achieving high-fidelity emulation requires significant manual customization. The study suggests that improved adaptability in automated tools could enhance their relevance in dynamic cybersecurity training environments, offering insights for further research on automation and emulation accuracy.

Abstract [sv]

Denna avhandling undersöker effektiviteten och realismen i automatiserad emulering av Advanced Persistent Threats (APT) inom cybersäkerhetsutbild- ning med det automatiserade verktyget Lore som fallstudie. Med den ökande komplexiteten hos cybersäkerhetshot skapar realistiska emuleringsverktyg möjligheter att stärka försvarsberedskapen. Studien fokuserar på att anpassa Lore för att simulera verkliga APT-beteenden genom att integrera en detaljerad emuleringsplan baserad på APT29s taktik, tekniker och procedurer (TTP), i enlighet med MITRE ATT&CK-ramverket. Genom en serie kontrollerade experiment i en simulerad miljö utvärderar studien möjligheterna att implementera dessa TTP i Lore och bedömer emule- ringarnas realism utifrån expertutlåtanden. Implementeringsmöjligheten mäts genom att bedöma andelen framgångsrikt utförda steg från emuleringsplanen och noggrannheten hos de implementerade TTP:erna för att replikera verkliga angriparbeteenden. Realism utvärderas ytterligare genom expertintervjuer, där cybersäkerhetsproffs ger kvalitativa betyg om simuleringarnas trohet och pedagogiska värde. Resultaten belyser utmaningarna i att överföra APT-profiler till automatiserade verktyg och visar att även om Lore uppvisar hög konfigurerbarhet, krävs betydande manuella anpassningar för att uppnå en hög nivå av emuleringsfidelitet. Studien pekar på att förbättrad anpassningsförmåga i automatiserade verktyg kan öka deras relevans i dynamiska cybersäkerhetsmiljöer, vilket öppnar för vidare forskning om automation och emuleringsprecision.

Place, publisher, year, edition, pages
2024. , p. 85
Series
TRITA-EECS-EX ; 2024:1003
Keywords [en]
Advanced Persistent Threat (APT), Cybersecurity Training, Automated Red Teaming, Threat Emulation, MITRE ATT&CK, Lore
Keywords [sv]
Advanced Persistent Threat (APT), Cybersäkerhetsutbildning, Automatiserad Red Teaming, Hotemulering, MITRE ATT&CK, Lore
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:kth:diva-361658OAI: oai:DiVA.org:kth-361658DiVA, id: diva2:1947161
External cooperation
The Swedish Defence Research Agency (FOI)
Supervisors
Examiners
Available from: 2025-03-27 Created: 2025-03-25 Last updated: 2025-03-27Bibliographically approved

Open Access in DiVA

fulltext(1566 kB)93 downloads
File information
File name FULLTEXT02.pdfFile size 1566 kBChecksum SHA-512
5a47a94c104150b2aa66ab7edf63a2f18b3162e8d19eee34b08b700721f807c55defedb2483275cde5574c2440469d6e3bcfa5f3fccee118cb87fedab0398337
Type fulltextMimetype application/pdf

By organisation
School of Electrical Engineering and Computer Science (EECS)
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 94 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 373 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf