{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:11:38Z","timestamp":1755997898007,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100013405","name":"Rijksdienst voor Ondernemend Nederland","doi-asserted-by":"publisher","award":["ITEA191010"],"award-info":[{"award-number":["ITEA191010"]}],"id":[{"id":"10.13039\/100013405","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["628.001.032"],"award-info":[{"award-number":["628.001.032"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427233","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"141-153","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["SAIBERSOC: Synthetic Attack Injection to Benchmark and Evaluate the Performance of Security Operation Centers"],"prefix":"10.1145","author":[{"given":"Martin","family":"Rosso","sequence":"first","affiliation":[{"name":"Eindhoven University of Technology, Netherlands"}]},{"given":"Michele","family":"Campobasso","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology"}]},{"given":"Ganduulga","family":"Gankhuyag","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology"}]},{"given":"Luca","family":"Allodi","sequence":"additional","affiliation":[{"name":"Eindhoven University of Technology, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevD.81.102001"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.022"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09797-4"},{"volume-title":"Understanding the Mirai Botnet. In 26th USENIX Security Symposium (USENIX Security 17)","year":"2017","author":"Antonakakis Manos","key":"e_1_3_2_2_4_1"},{"key":"e_1_3_2_2_5_1","unstructured":"Philippe Biondi. [n.d.]. scapy. Retrieved 2020-06-13 from https:\/\/scapy.net\/  Philippe Biondi. [n.d.]. scapy. Retrieved 2020-06-13 from https:\/\/scapy.net\/"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0071-9"},{"key":"e_1_3_2_2_7_1","unstructured":"Common Vulnerabilities and Exposures (CVE) Database 2018. CVE-2018-6789. Available from MITRE CVE-ID CVE-2018-6789. Retrieved 2020-06-13 from https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-6789  Common Vulnerabilities and Exposures (CVE) Database 2018. CVE-2018-6789. Available from MITRE CVE-ID CVE-2018-6789. Retrieved 2020-06-13 from https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-6789"},{"key":"e_1_3_2_2_8_1","unstructured":"The\u00a0MITRE Corporation. [n.d.]. MITRE PRE-ATT&CK Introduction. Retrieved 2020-06-13 from https:\/\/attack.mitre.org\/resources\/pre-introduction\/  The\u00a0MITRE Corporation. [n.d.]. MITRE PRE-ATT&CK Introduction. Retrieved 2020-06-13 from https:\/\/attack.mitre.org\/resources\/pre-introduction\/"},{"key":"e_1_3_2_2_9_1","unstructured":"Elasticsearch B.V.[n.d.]. The Elastic Stack. Retrieved 2020-06-13 from https:\/\/www.elastic.co\/elastic-stack (Elasticseach and Kibana).  Elasticsearch B.V.[n.d.]. The Elastic Stack. Retrieved 2020-06-13 from https:\/\/www.elastic.co\/elastic-stack (Elasticseach and Kibana)."},{"key":"e_1_3_2_2_10_1","unstructured":"Flask-RESTX [n.d.]. Flask-RESTX. Retrieved 2020-06-13 from https:\/\/github.com\/python-restx\/flask-restx  Flask-RESTX [n.d.]. Flask-RESTX. Retrieved 2020-06-13 from https:\/\/github.com\/python-restx\/flask-restx"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914795"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.38"},{"key":"e_1_3_2_2_13_1","first-page":"2013","article-title":"Information technology \u2014 Security techniques \u2014 Information security management systems \u2014 Requirements","volume":"27001","author":"ISO.","year":"2013","journal-title":"ISO\/IEC"},{"volume-title":"Johannesburg, South Africa","year":"2013","author":"Jacobs Pierre","key":"e_1_3_2_2_14_1"},{"volume-title":"Towards a Framework for Building Security Operation Centers. Master Thesis","year":"2020","author":"Jacobs Pierre\u00a0Conrad","key":"e_1_3_2_2_15_1"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354239"},{"key":"e_1_3_2_2_17_1","unstructured":"Lockheed Martin Corporation. [n.d.]. The Cyber Kill Chain. Retrieved 2020-06-13 from https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html  Lockheed Martin Corporation. [n.d.]. The Cyber Kill Chain. Retrieved 2020-06-13 from https:\/\/www.lockheedmartin.com\/en-us\/capabilities\/cyber\/cyber-kill-chain.html"},{"key":"e_1_3_2_2_18_1","unstructured":"Gordon\u00a0\u201cFyodor\u201d Lyon. [n.d.]. Nmap Security Scanner. Retrieved 2020-06-13 from https:\/\/nmap.org\/  Gordon\u00a0\u201cFyodor\u201d Lyon. [n.d.]. Nmap Security Scanner. Retrieved 2020-06-13 from https:\/\/nmap.org\/"},{"key":"e_1_3_2_2_19_1","unstructured":"Doug Miller Ron Alford Andy Applebaum Henry Foster Caleb Little and Blake\u00a0E. Strom. 2018. Automated Adversary Emulation: A Case for Planning and Acting with Unknowns. Retrieved 2020-06-13 from https:\/\/www.mitre.org\/publications\/technical-papers\/automated-adversary-emulation-a-case-for-planning-and-acting-with  Doug Miller Ron Alford Andy Applebaum Henry Foster Caleb Little and Blake\u00a0E. Strom. 2018. Automated Adversary Emulation: A Case for Planning and Acting with Unknowns. Retrieved 2020-06-13 from https:\/\/www.mitre.org\/publications\/technical-papers\/automated-adversary-emulation-a-case-for-planning-and-acting-with"},{"volume-title":"Security Operations Center: Building, Operating, and Maintaining Your SOC","author":"Muniz Joseph","key":"e_1_3_2_2_20_1"},{"key":"e_1_3_2_2_21_1","unstructured":"OffSec Services Limited. [n.d.]. Offensive Security\u2019s Exploit Database. Retrieved 2020-06-13 from https:\/\/www.exploit-db.com\/  OffSec Services Limited. [n.d.]. Offensive Security\u2019s Exploit Database. Retrieved 2020-06-13 from https:\/\/www.exploit-db.com\/"},{"key":"e_1_3_2_2_22_1","unstructured":"Open Security\u00a0Foundation (OISF). [n.d.]. Suricata. Retrieved 2020-06-13 from https:\/\/suricata-ids.org\/  Open Security\u00a0Foundation (OISF). [n.d.]. Suricata. Retrieved 2020-06-13 from https:\/\/suricata-ids.org\/"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.60"},{"key":"e_1_3_2_2_25_1","unstructured":"Rapid7 Inc.[n.d.]. Metasploit \u2013 The world\u2019s most used penetration testing framework. Retrieved 2020-06-13 from https:\/\/www.metasploit.com\/  Rapid7 Inc.[n.d.]. Metasploit \u2013 The world\u2019s most used penetration testing framework. Retrieved 2020-06-13 from https:\/\/www.metasploit.com\/"},{"key":"e_1_3_2_2_26_1","unstructured":"Red Canary. [n.d.]. Atomic Red Team. Retrieved 2020-06-13 from https:\/\/atomicredteam.io\/  Red Canary. [n.d.]. Atomic Red Team. Retrieved 2020-06-13 from https:\/\/atomicredteam.io\/"},{"key":"e_1_3_2_2_27_1","unstructured":"Armin Ronacher. [n.d.]. Flask. Retrieved 2020-06-13 from https:\/\/palletsprojects.com\/p\/flask\/  Armin Ronacher. [n.d.]. Flask. Retrieved 2020-06-13 from https:\/\/palletsprojects.com\/p\/flask\/"},{"key":"e_1_3_2_2_28_1","unstructured":"Security Onion Solutions LLC. [n.d.]. Security Onion. Retrieved 2020-06-13 from https:\/\/securityonion.net\/  Security Onion Solutions LLC. [n.d.]. Security Onion. Retrieved 2020-06-13 from https:\/\/securityonion.net\/"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-017-0365-1"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2871744"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663887.2663904"},{"volume-title":"Twelfth Symposium on Usable Privacy and Security, SOUPS 2016","year":"2016","author":"Sundaramurthy Sathya\u00a0Chandran","key":"e_1_3_2_2_32_1"},{"key":"e_1_3_2_2_33_1","unstructured":"tcpreplay [n.d.]. tcpreplay. Retrieved 2020-06-13 from https:\/\/tcpreplay.appneta.com\/  tcpreplay [n.d.]. tcpreplay. Retrieved 2020-06-13 from https:\/\/tcpreplay.appneta.com\/"},{"key":"e_1_3_2_2_34_1","unstructured":"The MITRE Corporation. [n.d.]. MITRE ATT&CK. Retrieved 2020-06-13 from https:\/\/attack.mitre.org\/  The MITRE Corporation. [n.d.]. MITRE ATT&CK. Retrieved 2020-06-13 from https:\/\/attack.mitre.org\/"},{"key":"e_1_3_2_2_35_1","unstructured":"The Tor Project Inc.[n.d.]. Tor. Retrieved 2020-06-13 from https:\/\/www.torproject.org\/  The Tor Project Inc.[n.d.]. Tor. Retrieved 2020-06-13 from https:\/\/www.torproject.org\/"},{"key":"e_1_3_2_2_37_1","unstructured":"Evan You. [n.d.]. vue.js. Retrieved 2020-06-13 from https:\/\/vuejs.org\/  Evan You. [n.d.]. vue.js. Retrieved 2020-06-13 from https:\/\/vuejs.org\/"},{"volume-title":"Ten strategies of a world-class cybersecurity operations center","author":"Zimmerman Carson","key":"e_1_3_2_2_38_1"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","acronym":"ACSAC '20","location":"Austin USA"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427233","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:24Z","timestamp":1750197744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427233"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":37,"alternative-id":["10.1145\/3427228.3427233","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427233","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}