TLDR: A new research paper proposes a framework that combines Breach Attack Simulation (BAS) with Security Chaos Engineering (SCE) to create more realistic and effective cyberattack simulations. This integration allows organizations to proactively identify vulnerabilities by leveraging adversary profiles and attack trees, as demonstrated through experiments where simulated worms successfully exploited system weaknesses due to misconfigurations and weak credentials.
In today’s interconnected world, organizations face a constant barrage of cyber threats. To stay ahead, it’s crucial to proactively find and fix vulnerabilities before attackers can exploit them. A new research paper introduces an innovative approach that combines two powerful cybersecurity methodologies: Breach Attack Simulation (BAS) and Security Chaos Engineering (SCE).
Traditional methods for simulating cyberattacks often struggle to keep up with the rapidly changing tactics of sophisticated adversaries. This can leave organizations with an incomplete understanding of their security weaknesses. Breach Attack Simulation (BAS) platforms help by allowing security teams to simulate realistic cyberattacks in a controlled environment. These platforms, like commercial tools such as SafeBreach and AttackIQ, or open-source options like MITRE Caldera, enable the creation of comprehensive and repeatable attack scenarios to evaluate defenses and improve incident response.
Security Chaos Engineering (SCE) is a more recent, transformative approach. It involves intentionally injecting faults or simulated attacks into a live system to see how it reacts under stress. By deliberately triggering failures, SCE aims to uncover hidden vulnerabilities and confirm the resilience of complex software systems. This method shifts security from a reactive stance to a proactive and adaptive one, fostering continuous learning and improvement.
The core idea of this research is to integrate SCE into BAS platforms. The paper proposes a structured architecture with three main layers: the SCE Orchestrator, the Connector, and the BAS layer. The BAS layer, built on MITRE Caldera, is responsible for executing automated attack sequences using real-world adversary profiles. The Connector layer acts as a bridge, standardizing communication between the SCE Orchestrator and the BAS layer. Finally, the SCE Orchestrator layer is the brain, designing and managing chaos-driven attack scenarios.
One of the key innovations is the ability to compose “Attack Trees” that leverage existing threat intelligence databases. These trees map out potential attack paths based on adversary profiles, detailing each step an attacker might take to achieve a specific goal, such as unauthorized data access. This structured approach, combined with the unpredictable nature of SCE, allows for a comprehensive simulation of diverse attack vectors.
The SCE Orchestrator takes user inputs like the target machine, the type of attack agent, and the security objective (e.g., testing ransomware resilience). It then uses a threat intelligence database to identify applicable attack procedures. The Chaos Experiment Designer module defines the scope of these simulations, dynamically selecting adversary tactics and techniques that align with the defined goals. The Attack Tree Generator then constructs a detailed attack tree, ready for execution.
The framework uses a modified version of ChaosXploit to control the logic of SCE experiments. The Exploiter module executes attacks based on the attack tree, while the Continuous Validator monitors system performance and stability, ensuring the integrity of the experiments. This continuous monitoring allows for immediate responses if unexpected issues arise.
To validate their proposal, the researchers conducted several experiments in a simulated environment. This setup included a Caldera server, a source machine (infected by a worm), a target machine with known vulnerabilities (like a vulnerable SMB server and weak security policies), and a DNS server. The experiments focused on simulating a self-replicating worm attempting lateral movement within the network.
The results showed that some adversary profiles, specifically “Windows Worm #1” and “Windows Worm #3,” successfully exploited the target machine. These worms managed to implant an agent on the source machine through a shared SMB folder with incorrect permissions, allowing unauthorized file copying. The files were then executed using methods like WMIC and WinRM, succeeding due to weak credentials and improper configurations. Other worm types failed due to a lack of necessary credentials for propagation, highlighting specific vulnerabilities.
Also Read:
- Training AI to Challenge AI: A Multi-Turn Red Teaming Strategy for LLMs
- Conversational Manipulation: A New Threat to AI Alignment
This research demonstrates how integrating Security Chaos Engineering with Breach Attack Simulation can significantly enhance the effectiveness of cyberattack simulations. It moves beyond traditional scenarios, providing a valuable tool for organizations to proactively identify vulnerabilities and strengthen their cyber defense strategies. The project material is available as open-source code for the cybersecurity community to explore and build upon. You can find more details in the full research paper available here.


