SOTAVerified

Realistic simulation of users for IT systems in cyber ranges

2021-11-23Unverified0· sign in to hype

Alexandre Dey, Benjamin Costé, Éric Totel, Adrien Bécue

Unverified — Be the first to reproduce this paper.

Reproduce

Abstract

Generating user activity is a key capability for both evaluating security monitoring tools as well as improving the credibility of attacker analysis platforms (e.g., honeynets). In this paper, to generate this activity, we instrument each machine by means of an external agent. This agent combines both deterministic and deep learning based methods to adapt to different environment (e.g., multiple OS, software versions, etc.), while maintaining high performances. We also propose conditional text generation models to facilitate the creation of conversations and documents to accelerate the definition of coherent, system-wide, life scenarios.

Tasks

Reproductions