SCyTAG: Scalable Cyber-Twin for Threat-Assessment Based on Attack Graphs

📅 2025-12-27
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Existing cybersecurity risk assessment methods suffer from a dichotomy: manual analysis relies heavily on expert knowledge and is infeasible for frequent execution, while automated approaches—such as attack graph– or threat simulation–based techniques—are hindered by the high overhead and poor scalability of conventional network twins. To address this, we propose an attack graph–guided paradigm for generating Minimal-Viable Network Twins (MV-NTs), automatically constructing lightweight, scenario-specific twin environments containing only mission-critical components derived from real-world Cyber Threat Intelligence (CTI) reports. Our method integrates attack graph modeling, topology reduction, CTI semantic parsing, and precise scenario mapping to enable accurate, efficient, and non-intrusive threat impact simulation. Evaluation on both real and synthetic enterprise networks demonstrates that MV-NT reduces component count by 85% and resource consumption by 50% compared to full-topology twins, without compromising attack simulation fidelity—achieving, for the first time, a closed-loop assessment pipeline from CTI to executable simulation.

Technology Category

Application Category

📝 Abstract
Understanding the risks associated with an enterprise environment is the first step toward improving its security. Organizations employ various methods to assess and prioritize the risks identified in cyber threat intelligence (CTI) reports that may be relevant to their operations. Some methodologies rely heavily on manual analysis (which requires expertise and cannot be applied frequently), while others automate the assessment, using attack graphs (AGs) or threat emulators. Such emulators can be employed in conjunction with cyber twins to avoid disruptions in live production environments when evaluating the highlighted threats. Unfortunately, the use of cyber twins in organizational networks is limited due to their inability to scale. In this paper, we propose SCyTAG, a multi-step framework that generates the minimal viable cyber twin required to assess the impact of a given attack scenario. Given the organizational computer network specifications and an attack scenario extracted from a CTI report, SCyTAG generates an AG. Then, based on the AG, it automatically constructs a cyber twin comprising the network components necessary to emulate the attack scenario and assess the relevance and risks of the attack to the organization. We evaluate SCyTAG on both a real and fictitious organizational network. The results show that compared to the full topology, SCyTAG reduces the number of network components needed for emulation by up to 85% and halves the amount of required resources while preserving the fidelity of the emulated attack. SCyTAG serves as a cost-effective, scalable, and highly adaptable threat assessment solution, improving organizational cyber defense by bridging the gap between abstract CTI and practical scenario-driven testing.
Problem

Research questions and friction points this paper is trying to address.

Automates attack graph generation for cyber threat assessment
Creates minimal cyber twins to emulate specific attack scenarios
Reduces resource needs while maintaining emulation fidelity
Innovation

Methods, ideas, or system contributions that make the work stand out.

Generates minimal viable cyber twin for attack assessment
Automatically constructs cyber twin from attack graph
Reduces network components needed by up to 85%
🔎 Similar Papers
No similar papers found.
D
David Tayouri
Ben-Gurion University of the Negev
E
Elad Duani
Ben-Gurion University of the Negev
A
Abed Showgan
Ben-Gurion University of the Negev
O
Ofir Manor
Fujitsu Research Europe
O
Ortal Lavi
Fujitsu Research Europe
I
Igor Podoski
Fujitsu Technology Solutions
M
Miro Ohana
Ben-Gurion University of the Negev
Yuval Elovici
Yuval Elovici
Head of Cyber@BGU, Director of Telekom Innovation Laboratories at BGU, Ben Gurion University
Computer and Network SecurityCyber Security
A
Andres Murillo
Fujitsu Research Europe
Asaf Shabtai
Asaf Shabtai
Software and Information Systems Engineering, Telekom Innovation Labs, Ben Gurion University
Computer and network securitymachine learning
Rami Puzis
Rami Puzis
Software and Information Systems Engineering Department, Ben-Gurion University of the Negev
complex networkssocial networksdeep learningcyber securitycyberbiosecurity