Engineering:LARIAT

From HandWiki
Short description: Network security platform
Lincoln Adaptable Real-time Information Assurance Testbed
Also known asLARIAT
DeveloperMIT Lincoln Laboratory
TypeNetwork Security Testbed
Release date2002 (2002)
Operating systemModified Linux (for traffic generators)
PredecessorUnnamed DARPA 1998/1999 testbed
SuccessorLLSIM

The Lincoln Adaptable Real-time Information Assurance Testbed (LARIAT) is a physical[1] computing platform developed by the MIT Lincoln Laboratory as a testbed for network security applications.[2] Use of the platform is restricted to the United States military, though some academic organizations can also use the platform under certain conditions.[3]

LARIAT was designed to help with the development and testing of intrusion detection (ID) and information assurance (IA) technologies.[4] Initially created in 2002,[5] LARIAT was the first simulated platform for ID testing[6] and was created to improve upon a preexisting non-simulated testbed that was created for DARPA's 1998 and 1999 ID analyses.[4] LARIAT is used by the United States military for training purposes and automated systems testing.[7]

Function

The platform simulates users and reflects vulnerabilities caused by design flaws and user interactions[8] and allows for interaction with real-world programs such as web browsers and office suites while simulating realistic user activity on these applications.[9] These virtual users are managed by Markov models which allow them to act differently from each other in a realistic way.[7]

This results in a realistic simulation of an active network of users that can then be targeted for malicious attacks to test the effectiveness of the attacks against network defenses, while also testing the effectiveness of intrusion detection methods and software in a simulated real-world environment with actual users in amongst the malicious traffic on the network. This is done because network intrusion detection software cannot as easily find instances of malicious network traffic when it is mixed in with non-malicious network traffic generated by legitimate users of the network.[9]

The traffic generators used by the testbed run on a modified version of Linux,[10] and a Java-based[10] graphical user interface called Director[7] is provided to allow users of the platform to configure and control testing parameters and to monitor the resulting network traffic.[4][9]

Influence

Cyberwarfare training programs such as those at the Korea Institute of Military Science and Technology's research center use the principles and methodologies of the LARIAT platform in the development of simulated threat generators for cyberwarfare training.[11] In non-security contexts, systems such as Artificial Intelligence programs build on the principles of the LARIAT platform to study and then simulate real-time user input and activity for automated testing systems.[12]

LLSIM

The MIT Lincoln Laboratory designed the Lincoln Laboratory Simulator (LLSIM) as a fully virtualized Java-based successor to LARIAT that can be run on a single computer without the need for dedicated physical network hardware or expensive testbeds.[5][13] It is not a full replacement for LARIAT, however, as it does not generate low-level data such as network packets. While this makes it more scalable than LARIAT since it simplifies certain processes, it cannot be used for certain ID testing purposes that LARIAT can be utilized for.[14]

References

  1. Shahzad, Khurram; Woodhead, Steve; Bakalis, Panos (2013). "A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing". in Hassanien, Aboul Ella. Advances in security of information and communication networks : first international conference, SecNet 2013, Cairo, Egypt, September 3-5, 2013 : proceedings. Heidelberg: Springer. pp. 56. ISBN 978-3-642-40597-6. OCLC 858945327. https://www.worldcat.org/oclc/858945327. "The 1998 DARPA off-line intrusion detection evaluation and LARIAT are also two physical machine testbeds sponsored by US Air Force and developed at the Lincoln Laboratory, MIT." 
  2. Wright, Charles V.; Connelly, Christopher; Braje, Timothy; Rabek, Jesse C.; Rossey, Lee M.; Cunningham, Robert K. (2010). "Generating Client Workloads and High-Fidelity Network Traffic for Controllable, Repeatable Experiments in Computer Security". in Jha, Somesh. Recent advances in intrusion detection : 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010, proceedings. Berlin: Springer. pp. 218–237. ISBN 978-3-642-15512-3. OCLC 676698663. https://www.worldcat.org/oclc/676698663. 
  3. García-Teodoro, P.; Díaz-Verdejo, J.; Maciá-Fernández, G.; Vázquez, E. (2009). "Anomaly-based network intrusion detection: Techniques, systems and challenges" (in en). Computers & Security 28 (1–2): 18–28. doi:10.1016/j.cose.2008.08.003. https://linkinghub.elsevier.com/retrieve/pii/S0167404808000692. "Unfortunately, LARIAT is restricted to US military environments and to some academic organizations under special circumstances.". 
  4. 4.0 4.1 4.2 Rossey, Lee M.; Cunningham, Robert K.; Fried, David J.; Rabek, Jesse C.; Lippmann, Richard P.; Haines, Joshua W.; Zissman, Marc A. (2002). "LARIAT: Lincoln adaptable real-time information assurance testbed". Proceedings, IEEE Aerospace Conference. 6. Big Sky, MT, USA: IEEE. pp. 6–2671–2676,-6-2682. doi:10.1109/AERO.2002.1036158. ISBN 978-0-7803-7231-3. https://ieeexplore.ieee.org/document/1036158. Retrieved August 11, 2022. 
  5. 5.0 5.1 Skopik, Florian; Settanni, Giuseppe; Fiedler, Roman; Friedberg, Ivo (2014). "Semi-synthetic data set generation for security software evaluation". 2014 Twelfth Annual International Conference on Privacy, Security and Trust. Toronto, ON, Canada: IEEE. pp. 156–163. doi:10.1109/PST.2014.6890935. ISBN 978-1-4799-3503-1. https://ieeexplore.ieee.org/document/6890935. 
  6. Årnes, André; Haas, Paul; Vigna, Giovanni; Kemmerer, Richard A. (2006). "Detection of Intrusions and Malware & Vulnerability Assessment". in Büschkes, Roland; Laskov, Pavel. 4064. Berlin, Heidelberg: Springer Berlin Heidelberg. pp. 144–163. doi:10.1007/11790754_9. ISBN 978-3-540-36014-8. 
  7. 7.0 7.1 7.2 Davis, Jon; Magrath, Shane (December 1, 2013). A Survey of Cyber Ranges and Testbeds (Report). Defence Science and Technology Group. p. 10. https://apps.dtic.mil/sti/citations/ADA594524. Retrieved August 12, 2022. 
  8. Yu, T.H.; Fuller, B.W.; Bannick, J.H.; Rossey, L.M.; Cunningham, R.K. (2008). "Integrated Environment Management for Information Operations Testbeds". in Goodall, John R.. VizSEC 2007 : proceedings of the Workshop on Visualization for Computer Security. Berlin: Springer. pp. 68. ISBN 978-3-540-78243-8. OCLC 272298719. https://www.worldcat.org/oclc/272298719. 
  9. 9.0 9.1 9.2 Braje, Timothy M. (February 15, 2016). Advanced Tools for Cyber Ranges (Report). Lexington, Massachusetts: MIT Lincoln Laboratory. pp. 5–6. https://apps.dtic.mil/sti/citations/AD1033870. Retrieved August 11, 2022. 
  10. 10.0 10.1 Haines, Joshua W.; Rossey, Lee M.; Lippmann, Richard P.; Cunningham, Robert K. (2001). "Extending the DARPA off-line intrusion detection evaluations". Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01. 1. Anaheim, CA, USA: IEEE Comput. Soc. pp. 35–45. doi:10.1109/DISCEX.2001.932190. ISBN 978-0-7695-1212-9. https://ieeexplore.ieee.org/document/932190. 
  11. Hong, Suyoun; Kim, Kwangsoo; Kim, Taekyu (2019). "사이버전 훈련을 위한 ATT&CK 기반 모의 위협 발생기 설계 및 구현" (in Korean). Journal of the Korea Institute of Military Science and Technology 22 (6): 797–805. doi:10.9766/KIMST.2019.22.6.797. ISSN 1598-9127. http://koreascience.or.kr/article/JAKO201910163249843.page. 
  12. Poston, Robin; Calvert, Ashley (2015). "Vision 2020: The Future of Software Quality Management and Impacts on Global User Acceptance". in Nah, Fiona Fui-Hoon. HCI in business : second International Conference, HCIB 2015, held as part of HCI International 2015, Los Angeles, CA, USA, August 2-7, 2015, Proceedings. Cham. pp. 754. ISBN 978-3-319-20895-4. OCLC 914296150. https://www.worldcat.org/oclc/914296150. 
  13. Haines, Joshua W.; Goulet, Stephen A.; Durst, Robert S.; Champion, Terrance G. (2003). "LLSIM: Network simulation for correlation and response testing". IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, 2003. West Point, NY, USA: IEEE. pp. 243–250. doi:10.1109/SMCSIA.2003.1232429. ISBN 978-0-7803-7808-7. https://ieeexplore.ieee.org/document/1232429. 
  14. Balzarotti, Davide (June 28, 2006). Testing Network Intrusion Detection Systems (PhD thesis). Polytechnic University of Milan. CiteSeerX 10.1.1.129.9810.