

Microsoft's New Open Source Attack Simulator Visualizes Cyberattacks
source link: https://www.makeuseof.com/microsofts-open-source-attack-simulator-visualizes-cyberattacks/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Microsoft's New Open Source Attack Simulator Visualizes Cyberattacks
Published 5 hours ago
The CyberBattleSim will help you model theoretical threats and learn how attackers spread through a network.
Microsoft is open-sourcing its internal threat modeling tool, CyberBattleSim, making the project available to anyone.
The handily named CyberBattleSim is a tool developed and used by the Microsoft 365 Defender Research team, helping to build "highly abstract" simulations of complex computer systems and how an attacker may spread laterally throughout it.
Microsoft hopes that the release of CyberBattleSim will encourage other security researchers to pick up the tool and develop further uses and roles for it and better understand how an attacker might act within a compromised network.
CyberBattleSim: An Open-Source Attack Simulator
At its core, CyberBattleSim is a threat modeling tool built using the Python-based Open AI Gym interface for ease of use.
Users can simulate a network of computer nodes using a fixed topology, then program a list of predefined vulnerabilities affecting the network. From there, the simulated attacker will attempt to breach the network using the defined vulnerabilities, exploiting any weaknesses in its attack.
In turn, automated defenses will attempt to protect against the attack, simulating how network defenses attempt to repel attackers and eject them from the network.
The simulation does not support machine code execution, and thus no security exploit actually takes place in it. We instead model vulnerabilities abstractly with a precondition defining the following: the nodes where the vulnerability is active, a probability of successful exploitation, and a high-level definition of the outcome and side-effects
From the outside, it looks like a fun, exploratory tool. But CyberBattleSim allows for extensively customizable scenarios using a huge range of triggers and parameters. The official Microsoft Security blog announcing the tool's release also details a custom capture-the-flag style challenge. At the same time, there are multiple types of predefined vulnerability outcomes that can affect the outcome of the model.
Related: The Best Intrusion Detection and Prevention Systems to Boost Your Cyber Security
AI Tech Important to Threat Modelling
The use of AI-tech in threat modeling scenarios is important, providing researchers with the tools to understand interactions and the trajectory of an ongoing attack.
Related: Understanding Malware: Common Types You Should Know About
Importantly, CyberSimBattle's simulation is highly abstract, meaning that it doesn't bear a resemblance to any real-world systems, curtailing its use as a theoretical malicious tool.
With CyberBattleSim, we are just scratching the surface of what we believe is a huge potential for applying reinforcement learning to security. We invite researchers and data scientists to build on our experimentation. We're excited to see this work expand and inspire new and innovative ways to approach security problems
Host vs. Network-Based: How do these IDS protect your servers from cyberattacks, and which is best?
About The Author

Gavin Phillips (813 Articles Published)
Gavin is the Junior Editor for Windows and Technology Explained, a regular contributor to the Really Useful Podcast, and was the Editor for MakeUseOf's crypto-focused sister site, Blocks Decoded. He has a BA (Hons) Contemporary Writing with Digital Art Practices pillaged from the hills of Devon, as well as over a decade of professional writing experience. He enjoys copious amounts of tea, board games, and football.
Subscribe To Our Newsletter
Join our newsletter for tech tips, reviews, free ebooks, and exclusive deals!
Recommend
-
107
MeetEasier Because why pay money for something you can do yourself? Description MeetEasier is a web application that visualizes meeting room availability. It works using Exchange Web Services (EWS) with Exchange room list...
-
37
Bit’s Component Playground now Visualizes Multiple Exports Bit’s web platform now visualizes multiple exports for your component. It’s cool, and also useful. Here’s why. ...
-
54
README.md Algorithm Visualizer Algorithm Visualizer is an interactive online platform that visualizes algorithms from code.
-
35
README.md HRDevHelper This plugin for the HexRays decompiler creates a graph of a decompiled function using IDA's internal graph viewer. It zooms in on...
-
32
Algorithm Visualizer Algorithm Visualizer is an interactive online platform that visualizes algorithms from code. Learning algorithms from text and static images is quite boring. There have been m...
-
28
RefactorInsight RefactorInsight is a plugin for IntelliJ IDEA that enables the IDE to visualize refactorings in the commit history of Java projects. RefactorInsight relies on
-
11
April 6, 2021 ...
-
4
How Volkswagen Group of America visualizes vehicles for 2030 and beyond
-
8
README.md
-
9
This concept visualizes everything we want in a new HomePod
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK