Please use this identifier to cite or link to this item: http://hdl.handle.net/10125/64562

CARTT: Cyber Automated Red Team Tool

File Size Format  
0661.pdf 655.5 kB Adobe PDF View/Open

Item Summary

dc.contributor.author Plot, Joseph
dc.contributor.author Shaffer, Alan
dc.contributor.author Singh, Gurminder
dc.date.accessioned 2020-01-04T08:34:36Z
dc.date.available 2020-01-04T08:34:36Z
dc.date.issued 2020-01-07
dc.identifier.isbn 978-0-9981331-3-3
dc.identifier.uri http://hdl.handle.net/10125/64562
dc.description.abstract Military weapon systems are often built using embedded, non-IP (Internet Protocol) based computer systems that are not regularly updated and patched due to their isolation. As adversaries expand their capability to exploit and penetrate these systems, we must be able to verify they are not susceptible to cyber-attack. Currently, cyber red teams are employed to assess the security of systems and networks in isolated environments, however, this method can be costly and time-consuming, and the availability of red teams is limited. To address this need and resource shortfall, we have developed the Cyber Automated Red Team Tool (CARTT) that leverages open source software and methods to discover, identify, and conduct a vulnerability scan on a computer system’s software. The results of the vulnerability scan offer possible mitigation strategies to lower the risk from potential cyber-attacks without the need for a dedicated cyber red team operating on the target host or network.
dc.format.extent 10 pages
dc.language.iso eng
dc.relation.ispartof Proceedings of the 53rd Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject The Science and Engineering of Cyber Systems
dc.subject cyber
dc.subject network
dc.subject red team
dc.subject security
dc.subject software vulnerability
dc.title CARTT: Cyber Automated Red Team Tool
dc.type Conference Paper
dc.type.dcmi Text
dc.identifier.doi 10.24251/HICSS.2020.820
Appears in Collections: The Science and Engineering of Cyber Systems


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons