Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment

As cybersecurity threats evolve alarmingly, conventional defense strategies are becoming increasingly ineffective. In response to this urgent challenge, our study presents a transformative approach to red-teaming exercises by integrating the MITRE ATT&CK framework. This innovative integration le...

Full description

Saved in:
Bibliographic Details
Main Authors: Semi Yulianto, Benfano Soewito, Ford Lumban Gaol, Aditya Kurniawan
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2025-12-01
Series:Cyber Security and Applications
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2772918424000432
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:As cybersecurity threats evolve alarmingly, conventional defense strategies are becoming increasingly ineffective. In response to this urgent challenge, our study presents a transformative approach to red-teaming exercises by integrating the MITRE ATT&CK framework. This innovative integration leverages real-world attacker tactics and behaviors to create highly realistic scenarios that rigorously test defenses and uncover previously unidentified vulnerabilities. Our comprehensive evaluation demonstrates a significant enhancement in the realism and effectiveness of red-teaming, leading to improved vulnerability identification and the generation of actionable insights for proactive remediation. This study uniquely contributes by providing a structured, data-driven methodology that aligns current defenses with emerging threat tactics and promotes continuous improvement in cybersecurity resilience. Such advancements are essential for organizations seeking to stay ahead of attackers and maintain robust cyber defenses in dynamic threat environments. The significance of this study lies in offering a structured approach to strengthen cybersecurity resilience against evolving threats and providing a model for continual defense enhancement. Future research should investigate the impact of this integration on long-term cybersecurity strategies.
ISSN:2772-9184