In this article, we introduce SAIBERSOC (Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers), a tool and methodology enabling security researchers and operators to evaluate the performance of deployed and operational Security Operation Centers (SOC) — or any other security monitoring infrastructure. The methodology relies on the MITRE ATT&CK Framework to define a procedure to generate and automatically inject synthetic attacks in an operational SOC to evaluate any output metric of interest (e.g., detection accuracy, time-to-investigation). To evaluate the effectiveness of the proposed methodology, we devise an experiment with n=124 students playing the role of SOC analysts. The experiment ...
A new malware is identified every fewer than five seconds in today's threat environment, which is ch...
Abstract: The aim of this article looks into the comprehensive methods in re-architecting a security...
The first part of this thesis describes the results of applying dependability methods to the securit...
In this article, we introduce SAIBERSOC (Synthetic Attack Injection to Benchmark and Evaluate the Pe...
Malware has evolved from viruses attacking single victims to more sophisticated malware with disrupt...
In this 21st century, we have seen a major rise in the use of advanced technological devices. It is ...
Security Operation Centers (SOCs) have become an integral component of business organizations all ov...
The increasing use of Security Operations Centers (SOCs) by organisations as a part of their cyberse...
Current threat analysis processes followed by tier-1 (T1) analysts in a Security Operation Center (S...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
When critical assets or functionalities are included in a piece of software accessible to the end us...
Recent years have witnessed the growth of the adoption of Cyber-Physical Systems (CPSs) in many sect...
The two experiments described here were intended to investigate the empirical issues that arise from...
The typical cyber attacker is assumed to be all powerful and to exploit allpossible vulnerabilities....
The increasing dependency of modern society on IT systems and infrastructures for essential services...
A new malware is identified every fewer than five seconds in today's threat environment, which is ch...
Abstract: The aim of this article looks into the comprehensive methods in re-architecting a security...
The first part of this thesis describes the results of applying dependability methods to the securit...
In this article, we introduce SAIBERSOC (Synthetic Attack Injection to Benchmark and Evaluate the Pe...
Malware has evolved from viruses attacking single victims to more sophisticated malware with disrupt...
In this 21st century, we have seen a major rise in the use of advanced technological devices. It is ...
Security Operation Centers (SOCs) have become an integral component of business organizations all ov...
The increasing use of Security Operations Centers (SOCs) by organisations as a part of their cyberse...
Current threat analysis processes followed by tier-1 (T1) analysts in a Security Operation Center (S...
The ever-increasing rate of sophisticated cyber-attacks and its subsequent impact on networks has re...
When critical assets or functionalities are included in a piece of software accessible to the end us...
Recent years have witnessed the growth of the adoption of Cyber-Physical Systems (CPSs) in many sect...
The two experiments described here were intended to investigate the empirical issues that arise from...
The typical cyber attacker is assumed to be all powerful and to exploit allpossible vulnerabilities....
The increasing dependency of modern society on IT systems and infrastructures for essential services...
A new malware is identified every fewer than five seconds in today's threat environment, which is ch...
Abstract: The aim of this article looks into the comprehensive methods in re-architecting a security...
The first part of this thesis describes the results of applying dependability methods to the securit...