Understanding the risks associated with an enterprise environment is the first step toward improving its security. Organizations employ various methods to assess and prioritize the risks identified in cyber threat intelligence (CTI) reports that may be relevant to their operations. Some methodologies rely heavily on manual analysis (which requires expertise and cannot be applied frequently), while others automate the assessment, using attack graphs (AGs) or threat emulators. Such emulators can be employed in conjunction with cyber twins to avoid disruptions in live production environments when evaluating the highlighted threats. Unfortunately, the use of cyber twins in organizational networks is limited due to their inability to scale. In this paper, we propose SCyTAG, a multi-step framework that generates the minimal viable cyber twin required to assess the impact of a given attack scenario. Given the organizational computer network specifications and an attack scenario extracted from a CTI report, SCyTAG generates an AG. Then, based on the AG, it automatically constructs a cyber twin comprising the network components necessary to emulate the attack scenario and assess the relevance and risks of the attack to the organization. We evaluate SCyTAG on both a real and fictitious organizational network. The results show that compared to the full topology, SCyTAG reduces the number of network components needed for emulation by up to 85% and halves the amount of required resources while preserving the fidelity of the emulated attack. SCyTAG serves as a cost-effective, scalable, and highly adaptable threat assessment solution, improving organizational cyber defense by bridging the gap between abstract CTI and practical scenario-driven testing.
翻译:理解企业环境所面临的风险是提升其安全性的第一步。组织采用多种方法来评估和优先处理网络威胁情报报告中识别出的、可能与其运营相关的风险。部分方法严重依赖人工分析(这需要专业知识且无法频繁进行),而另一些方法则通过使用攻击图或威胁模拟器实现评估自动化。此类模拟器可与网络孪生结合使用,以便在评估重点威胁时避免对实际生产环境造成干扰。然而,由于可扩展性不足,网络孪生在组织网络中的应用受到限制。本文提出SCyTAG,一个多步骤框架,能够生成评估给定攻击场景影响所需的最小可行网络孪生。基于组织计算机网络规范及从网络威胁情报报告中提取的攻击场景,SCyTAG首先生成攻击图。随后,依据该攻击图自动构建网络孪生,其中包含模拟攻击场景所需的网络组件,以评估该攻击对组织的相关性与风险。我们在真实与虚构的组织网络上对SCyTAG进行了评估。结果表明,与完整拓扑相比,SCyTAG在保持攻击模拟保真度的同时,将模拟所需的网络组件数量减少高达85%,并将所需资源量减半。SCyTAG作为一种经济高效、可扩展且高度适配的威胁评估方案,通过弥合抽象网络威胁情报与实用场景驱动测试之间的差距,提升了组织的网络防御能力。