Archived Projects

Summiting the Pyramid v1

September 10, 2023

Project Summary

Many analytics are dependent on specific tools or artifacts. Adversaries can easily evade these with low-cost changes that exploit the dependencies. This project developed a method to evaluate analytics relative to the adversary’s cost to evade. We further created approaches and tips for defenders to make their analytics less evadable. We demonstrated the methodology with a core set of analytics.

This is an old version of the Summiting the Pyramid project. For the latest version, see: Summiting the Pyramid.

Problem

Adversaries can easily evade cyber analytics that are dependent on specific tools or artifacts.

Solution

Create and apply a methodology to evaluate the dependencies inside analytics and make them more robust by focusing on adversary behaviors.

Impact

Shift the advantage towards defenders with improved analytics that catch adversaries even as they evolve and detect future campaigns.


Funding Research Participants


Explore More of Our Work:

Security Stack Mappings – Hardware-Enabled Defense

The Security Stack Mappings – Hardware-Enabled Defense project demonstrates full stack threat-informed defense, from the hardware board to the …

Continue reading

Summiting the Pyramid

Summiting the Pyramid (STP) creates a methodology to score analytics against the pyramid of pain, helping defenders create more robust detections …

Continue reading

Secure AI

A collaboration with MITRE ATLAS™ to advance security for AI–enabled systems that takes a threat-informed approach, enables rapid exchange of new …

Continue reading

Stay Informed

Sign up for the Center's "Stay Informed" newsletter to get notified for new project releases and upcoming events.