What is it about?

This research paper proposes A-DEMO, a framework aimed at researchers and security analysts, that provides a structured methodology for the proper analysis, documentation and emulation of real-world cyberattacks along with mitigation actions. As a case study for validation of A-DEMO, a rootkit attack emulation against a replicated healthcare infrastructure is implemented and documented.

Featured Image

Why is it important?

Realistic attacks are yet not deployed and emulated sufficiently. This research assists and guides the approach to deploy and execute realistic security scenarios based on the MITRE ATT&CK framework.

Perspectives

We hope that this article could be a walkthrough and sets up the methodology to document and re-use past cyberattacks to replicate them realistically and be able to experiment with the mitigation techniques.

Dr. Stylianos Karagiannis
Ionian University

Read the Original

This page is a summary of: A-DEMO: ATT&CK Documentation, Emulation and Mitigation Operations, November 2021, ACM (Association for Computing Machinery),
DOI: 10.1145/3503823.3503884.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page