Date of Graduation
5-2025
Document Type
Thesis
Degree Name
Bachelor of Science in Computer Science
Degree Level
Undergraduate
Department
Computer Science and Computer Engineering
Advisor/Mentor
Panda, Brajendra Nath
Committee Member
Ngan Le, Thi Hoang
Second Committee Member
Li, Qinghua
Abstract
The purpose of this paper is to present a framework for selecting between two methods of Automated Adversary Emulation (AAE). As IT systems become increasingly complex and interconnected, adopting a zero-trust mindset of cybersecurity is essential. This mindset extends to cybersecurity testing, where a combined offensive/defensive approach ("purple teaming") can utilize adversary emulation to uncover vulnerabilities efficiently and effectively. While AAE is rapidly gaining traction across various industries and applications, there is limited guidance in the current literature on how to choose the optimal method for different testing scenarios. This paper defines two common approaches to AAE and examines eight key variables to consider when selecting the most suitable method. To illustrate the framework, a small test of web application vulnerabilities is conducted, demonstrating how the framework provides valuable guidance in choosing the appropriate AAE method for a given scenario.
Keywords
cybersecurity
Citation
Rogers, N. J. (2025). Evaluation of Two Methods of Automated Adversary Emulation. Electrical Engineering and Computer Science Undergraduate Honors Theses Retrieved from https://scholarworks.uark.edu/elcsuht/7