Please use this identifier to cite or link to this item:

CARTT: Cyber Automated Red Team Tool

File Size Format  
0661.pdf 655.5 kB Adobe PDF View/Open

Item Summary Plot, Joseph Shaffer, Alan Singh, Gurminder 2020-01-04T08:34:36Z 2020-01-04T08:34:36Z 2020-01-07
dc.identifier.isbn 978-0-9981331-3-3
dc.description.abstract Military weapon systems are often built using embedded, non-IP (Internet Protocol) based computer systems that are not regularly updated and patched due to their isolation. As adversaries expand their capability to exploit and penetrate these systems, we must be able to verify they are not susceptible to cyber-attack. Currently, cyber red teams are employed to assess the security of systems and networks in isolated environments, however, this method can be costly and time-consuming, and the availability of red teams is limited. To address this need and resource shortfall, we have developed the Cyber Automated Red Team Tool (CARTT) that leverages open source software and methods to discover, identify, and conduct a vulnerability scan on a computer system’s software. The results of the vulnerability scan offer possible mitigation strategies to lower the risk from potential cyber-attacks without the need for a dedicated cyber red team operating on the target host or network.
dc.format.extent 10 pages
dc.language.iso eng
dc.relation.ispartof Proceedings of the 53rd Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.subject The Science and Engineering of Cyber Systems
dc.subject cyber
dc.subject network
dc.subject red team
dc.subject security
dc.subject software vulnerability
dc.title CARTT: Cyber Automated Red Team Tool
dc.type Conference Paper
dc.type.dcmi Text
dc.identifier.doi 10.24251/HICSS.2020.820
Appears in Collections: The Science and Engineering of Cyber Systems

Please email if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons