G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RR-A382-1
来源IDRR-A382-1
RAND's Scalable Warning and Resilience Model (SWARM): Enhancing Defenders' Predictive Power in Cyberspace
Bilyana Lilly; Adam S. Moore; Quentin E. Hodgson; Daniel Weishoff
发表日期2021-05-11
出版年2021
语种英语
结论

The variety of cyber threats that organizations face necessitates a tailored and targeted approach to cyber security

  • The current wide spectrum of actors, methods, and scenarios that can pose a risk to U.S. and allied interests is reflected in a broader definition of threats in cyberspace.
  • Current cyber defenses primarily focus on identifying and managing cyber threats after the cyber adversary has already breached the networks, not beforehand.
  • I&W frameworks—that have been developed by the U.S. intelligence community and are intended to be analytical processes providing ways of monitoring, reporting on, and detecting developments related to threats—can be effectively applied to cyberspace and can increase cyber defenders' ability to anticipate threats before those threats breach the networks of an organization.

SWARM is a four-step threat-centric process that facilitates the prioritization of threats while enhancing resilience and predictive power

  • SWARM is adaptable across organizations and helps defenders prioritize state-sponsored threats to their information environment.
  • SWARM is designed to increase predictive power by providing advance warning for cyber incidents through early and more-comprehensive indicators, both technical and nontechnical.
  • SWARM intends to enhance network resilience against targeted cyber incidents.
摘要

In the first two decades of the 21st century, the coevolutionary adaptation of cyber threat actors and technology has been akin to an escalatory arms race between cyber offense and cyber defense. Paradigm-shifting technology advancement, transparent unclassified reporting on cyber incidents, and the proliferation of open-source hacking tools in the context of complex geopolitical dynamics further exacerbate the cyber defense challenge. Although the integration of such practices as cyber threat modeling, information-sharing, and threat-hunting into defensive strategies has become more common in recent years, the cyber defense community needs to continue to push the envelope to become more resilient and, ideally, get ahead of the threats facing organizations.

,

This research endeavors to contribute to the community via the formulation of a process-based model called the Scalable Warning and Resilience Model (SWARM), which focuses on cyber threats from state-sponsored actors but without the assumption of access to classified information or assets. SWARM prioritizes threat detection, facilitates better prediction of cyber incidents, and enhances network resilience by combining processes that seek to help organizations anticipate and defend against attackers. The model tailors data collection, cyber threat intelligence, and penetration testing to the particular type of intrusion sets most likely to target one's network.

,

This proposed model adapts the concept of applying both resilience and indications and warning (I&W) frameworks to information environments while also incorporating a combination of tailored threat modeling and emulation. This report also includes a case study—based on cyber incidents that occurred at the RAND Corporation—that demonstrates how the model has the potential to produce promising results for defenders by proactively protecting their systems through early warning of cyber incidents before they occur.

目录
  • Chapter One

    Introduction, Research Methodology, and Historical Evolution of Concepts

  • Chapter Two

    Indications and Warning Frameworks

  • Chapter Three

    RAND's Scalable Warning and Resilience Model at a Glance

  • Chapter Four

    SWARM Step One: Identify Relevant Cyber Adversaries

  • Chapter Five

    SWARM Step Two: Focus All-Source Intelligence Collection

  • Chapter Six

    SWARM Step Three: Apply a Threat Model

  • Chapter Seven

    SWARM Step Four: Adversary Emulation

  • Chapter Eight

    Case Study: Applying SWARM to Predict Phishing Campaigns from the North Korea–Nexus Kimsuky Threat Actor

  • Chapter Nine

    Conclusion

主题Cyber Warfare ; Data Analysis ; Information Operations ; Intelligence Collection ; Modeling and Simulation ; North Korea ; Threat Assessment
URLhttps://www.rand.org/pubs/research_reports/RRA382-1.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/524448
推荐引用方式
GB/T 7714
Bilyana Lilly,Adam S. Moore,Quentin E. Hodgson,et al. RAND's Scalable Warning and Resilience Model (SWARM): Enhancing Defenders' Predictive Power in Cyberspace. 2021.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RRA382-1.pdf(6212KB)智库出版物 限制开放CC BY-NC-SA浏览
x1620736692576.jpg.p(2KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Bilyana Lilly]的文章
[Adam S. Moore]的文章
[Quentin E. Hodgson]的文章
百度学术
百度学术中相似的文章
[Bilyana Lilly]的文章
[Adam S. Moore]的文章
[Quentin E. Hodgson]的文章
必应学术
必应学术中相似的文章
[Bilyana Lilly]的文章
[Adam S. Moore]的文章
[Quentin E. Hodgson]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RRA382-1.pdf
格式: Adobe PDF
文件名: x1620736692576.jpg.pagespeed.ic.oQUeeflI9J.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。