The MITRE ATTACK framework enables practitioners to understand and track cyber adversary behaviors. Concepts such as social engineering (SE) are not directly captured in current version of ATTACK as an individual technique, though the application of SE is relevant to many technical behaviors. Utilizing the ATTACK framework in an educational setting, specifically within a competition focused on SE, allows students to explore adversarial behavior through experiential learning and understand how SE is relevant within cybersecurity. The structure of the framework allows students to see and describe each behavior from the perspective of the adversary, motivating them to compile and question "why" and "how" each individual action contributes to the operational objectives. This paper shares students mappings of the ATTACK framework to playbooks they developed during a real-Time SE penetration testing competition. Students were given numerous flags to pursue during the competition and this paper will share their playbooks and mappings to the ATTACK framework. This paper demonstrates that while someone with more knowledge and experience using the framework may map a SE case study differently than multidisciplinary students who are experiencing it for the first time, there is not a single correct way to map onto the matrix. Having students experience this mapping process allows them to understand the breakdown of an adversary s behavior and interpret key tactics and techniques in a way that fits their mapping needs. This paper also demonstrates how a SE case study can be mapped onto the ATTACK framework despite SE not being the focus of the framework, and that SE uses tactics and techniques that are also relevant to technical cyberattacks. The authors hope to encourage more interdisciplinary cybersecurity education by sharing this experiential learning event.
CITATION STYLE
Rege, A., Williams, J., Bleiman, R., & Williams, K. (2023). Students application of the mitre attack® framework via a real-Time cybersecurity exercise. In European Conference on Information Warfare and Security, ECCWS (Vol. 2023-June, pp. 384–394). Curran Associates Inc. https://doi.org/10.34190/eccws.22.1.1126
Mendeley helps you to discover research relevant for your work.