Please use this identifier to cite or link to this item:
http://oaps.umac.mo/handle/10692.1/297
Title: | Automated detection testing – to integrate automated attack simulation and triaging with the right event logs |
Authors: | CHU, KA SENG(朱家成) |
Department: | Department of Computer and Information Science |
Faculty: | Faculty of Science and Technology |
Issue Date: | Apr-2023 |
Citation: | Chu, K. S. (2023). Automated detection testing – to integrate automated attack simulation and triaging with the right event logs(Outstanding Academic Papers by Students (OAPS)). Retrieved from University of Macau, Outstanding Academic Papers by Students Repository. |
Abstract: | Malicious attacks have grown in popularity and impact during this decade since malicious incidents have become more frequent, and information on the internet makes them easier to run. More investigation and evaluation in cybersecurity are needed, whether it be the Red or Blue teams, both offensive and defensive aspects in cybersecurity. Since the government makes some laws about cybersecurity, the company has to concern about it than before. This project aims to solve the problems that automatically detect suspicious activity based on system logs and check the relationship between them. There is a product about the automated attack simulation on the target hosts; the attacks are from Atomic Red Team, based on MITER's ATT&CK. We are using the Wazuh platform to collect the system log of the client hosts to analyze and show in a dashboard; it is a cybersecurity monitor product that gathers the system log in different locations and customizes detection rules to trigger suspicious events. Thus, this project contains two primary parts; first is a program that automatically simulates attacks on the target host after building Wazuh rules and shows it on a user interface; the second is a visualization of the events log in a graph, which finds the relationship between the event logs to help the analysts to check the actual cyber attacks chains, and provided a way to let them customize the rules to capture the attack chains which they wanted to investigate. We created over a hundred Wazuh detection rules to trigger suspicious attack events, and they aim to provide alerts to two products using. The automated attack and detection program is written in Python; it uses the Python Socket to connect with the backdoor agent in target hosts, send attack commands, and execute them on hosts to achieve the automated attack simulation, then using Elasticsearch API to connect Wazuh database to fetch the alerts to achieve the automated detection. The web application for visualization of the event logs and correlation used HTML, CSS, and JavaScript as the front end and Python Django as the back end to create the correlation graphs. Because of the scope of our project, Windows and MacOS are not included in our work since we will be designing attack instances and detection rules only for Linux computers. Finally, our applications will be used by PwC to help them with their daily work. |
Instructor: | Prof. Yibo Bob ZHANG |
Programme: | Bachelor of Science in Computer Science |
URI: | http://oaps.umac.mo/handle/10692.1/297 |
Appears in Collections: | FST OAPS 2023 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
OAPS_2023_FST_DB926473_Chu KaSeng_Automated detection testing – to integrate automated attack simulation and triaging with the right event logs.pdf | 25.65 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.