Skip to main content

The Art of Red Teaming

  • Chapter
  • First Online:
  • 1074 Accesses

Abstract

Red Teaming (RT) has been considered the art of ethical attacks. In RT, an organization attempts to role play an attack on itself to evaluate the resilience of its assets, concepts, plans, and even organizational culture. While historically, RT has been considered a tool by the military to evaluate its own plans, this chapter will remove RT from the military context and take steps to generalize it as an art before discussing it in later chapters as a science. This chapter will first introduce the basic concept of RT, will discuss the characteristics of what makes a successful red team, and present a set of systemic steps to design a RT exercise. The topic necessitates a detailed discussion on the ethics of RT, including the ethical issues to consider when planning the budget and financial commitments of the exercise. To lay the foundation for transforming RT to the computational world, this chapter concludes with an explanation of why RT exercises cannot be fully automated, followed by a discussion on how RT contributes to the field of artificial intelligence.

The commander must work in a medium which his eyes cannot see, which his best deductive powers cannot always fathom; and with which, because of constant changes, he can rarely become familiar.

Carl von Clausewitz (1780–1831) [49]

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    These concepts will be discussed in more details in Chap. 3

  2. 2.

    By self-talking or self-rehearsal, we mean internal conversations that occur in a person’s mind. Imagine you are going to fire someone in the organization that you know very well. Assume you are a people person; that is, you care about people so it is important for you to ensure the person gets hurt as less as possible. You start to rehearse in your own mind what you will say to this person. You may even imagine what the person will reply to you and what you will reply back. This is a form of rehearsal and internal RT within one’s self. Through self-talking, the person reinforces certain concepts and words, a process which helps the person to remember and counteract their internal fears and negative thoughts.

  3. 3.

    Constraints can be hard or soft. Hard constraints can’t be broken, that is, the constraint must be respected or the solution is not accepted. Soft constraints can be broken with a cost. The scope of a RT exercise may need to be updated, or the interaction between red and blue may beg a change in the original scope.

  4. 4.

    For example, a person in a red teaming exercise learns the skills to penetrate a computer system then decides to do so in the real world to commit fraud.

References

  1. Abbass, H.: Computational red teaming and cyber challenges. In: Platform Technologies Research Institute Annual Symposium, PTRI (2009)

    Google Scholar 

  2. Abbass, H.A., Barlow, M.: Computational red teaming for counter improvised explosive devices with a focus on computer games. In: Gowlett, P. (ed.) Moving Forward with Computational Red Teaming. DSTO, Australia (2011)

    Google Scholar 

  3. Abbass, H.A., Bender, A., Gaidow, S.: Evolutionary computation for risk assessment using computational red teaming. In: Sobrevilla, P., Aranda, J., Xambo, S. (eds.) 2010 IEEE World Congress on Computational Intelligence Plenary and Invited Lectures Proceedings, pp. 207–230. IEEE, Barcelona (2010)

    Google Scholar 

  4. Abbass, H., Bender, A., Gaidow, S., Whitbread, P.: Computational red teaming: past, present and future. IEEE Comput. Intell. Mag. 6(1), 30–42 (2011)

    Article  Google Scholar 

  5. Alam, S., Zhao, W., Tang, J., Lokan, C., Ellejmi, M., Kirby, S., Abbass, H.: Discovering delay patterns in arrival traffic with dynamic continuous descent approaches using co-evolutionary red teaming. Air Traffic Control Q. 20(1), 47 (2012)

    Google Scholar 

  6. Amin, R., Tang, J., Ellejmi, M., Kirby, S., Abbass, H.A.: Computational red teaming for correction of traffic events in real time human performance studies. In: USA/Europe ATM R&D Seminar, Chicago (2013)

    Google Scholar 

  7. Barlow, M., Easton, A.: Crocadile-an open, extensible agent-based distillation engine. Inf. Secur. 8(1), 17–51 (2002)

    Google Scholar 

  8. Barlow, M., Yang, A., Abbass, H.: A temporal risk assessment framework for planning a future force structure. In: IEEE Symposium on Computational Intelligence in Security and Defense Applications, (CISDA), pp. 100–107. IEEE, Honolulu (2007)

    Google Scholar 

  9. Bitinas, E.J., Henscheid, Z.A., Truong, L.V.: Pythagoras: a new agent-based simulation system. Technol. Rev. J. 11(1), 45–58 (2003)

    Google Scholar 

  10. Calder, R., Smith, J., Courtemanche, A., Mar, J., Ceranowicz, A.Z.: Modsaf behavior simulation and control. In: Proceedings of the Conference on Computer Generated Forces and Behavioral Representation (1993)

    Google Scholar 

  11. Caldwell, W.J., Wood, R., Pate, M.C.: JLINK—Janus fast movers. In: Proceedings of the 27th Conference on Winter Simulation, pp. 1237–1243. IEEE Computer Society, Washington (1995)

    Google Scholar 

  12. Carter Matherly: The Red Teaming Essential. Selectedworks (2013)

    Google Scholar 

  13. Choo, C.S., Chua, C.L., Tay, S.H.V.: Automated red teaming: a proposed framework for military application. In: Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, pp. 1936–1942. ACM, New York (2007)

    Google Scholar 

  14. Davis, P.K.: Applying artificial intelligence techniques to strategic-level gaming and simulation. Tech. rep., Rand Corporation (1988)

    Google Scholar 

  15. Davis, P.K.: Dealing with complexity: exploratory analysis enabled by multiresolultion, multiperspective modeling. In: Proceedings of the 32nd Conference on Winter simulation, pp. 293–302. Society for Computer Simulation International, San Diego (2000)

    Google Scholar 

  16. Davis, P.K., Bankes, S.C., Egner, M.: Enhancing Strategic Planning with Massive Scenario Generation: Theory and Experiments, vol. 392. Rand Corporation Press, Santa Monica, CA 90407-2138 (2007)

    Google Scholar 

  17. Decraene, J., Chandramohan, M., Low, M.Y.H., Choo, C.S.: Evolvable simulations applied to automated red teaming: a preliminary study. In: Proceedings of the Winter Simulation Conference, pp. 1444–1455. Winter Simulation Conference (2010)

    Google Scholar 

  18. Decraene, J., Zeng, F., Low, M.Y.H., Zhou, S., Cai, W.: Research advances in automated red teaming. In: Proceedings of the 2010 Spring Simulation Multiconference, p. 47. Society for Computer Simulation International (2010)

    Google Scholar 

  19. Director, C.O.: Plans. defence capability development manual. Tech. rep., Technical report, Australian Department of Defence (2006)

    Google Scholar 

  20. Force, T.: The role and status of dod red teaming activities. Tech. rep., Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics (2003)

    Google Scholar 

  21. Gowlett, P.: Moving forward with computational red teaming. Tech. rep., Defence Science and Technology Organisation - DSTO, Australia (2011)

    Google Scholar 

  22. Hingston, P.: A turing test for computer game bots. IEEE Trans. Comput. Intell. AI Games 1(3), 169–186 (2009)

    Article  Google Scholar 

  23. Hingston, P., Preuss, M.: Red teaming with coevolution. In: IEEE Congress on Evolutionary Computation (CEC), pp. 1155–1163. IEEE, New Orleans (2011)

    Google Scholar 

  24. Hingston, P., Preuss, M., Spierling, D.: Redtnet: a network model for strategy games. In: IEEE Congress on Evolutionary Computation (CEC), pp. 1–9. IEEE, Barcelona (2010)

    Google Scholar 

  25. Ilachinski, A.: Enhanced ISAAC neural simulation toolkit (EINSTein): an artificial-life laboratory for exploring self-organized emergence in land combat (U). Center for Naval Analyses, Beta-Test Users Guide 1101, no. 610.10 (1999)

    Google Scholar 

  26. Ilachinski, A.: Irreducible semi-autonomous adaptive combat (ISAAC): an artificial-life approach to land combat. Mil. Oper. Res. 5(3), 29–46 (2000)

    Article  Google Scholar 

  27. ISO: ISO 31000:2009, Risk Management - Principles and Guidelines (2009)

    Google Scholar 

  28. Lampe, T., Seichter, G.: Pax3d refugee camp scenario–calibration of the adapted pax model. In: Scythe: Proceedings and Bulletin of the International Data Farming Community (Scythe 6), IDFW18, Monterey, CA, USA (2009)

    Google Scholar 

  29. Lauder, M.: Red dawn: the emergence of a red teaming capability in the Canadian forces. Can. Army J. 12(2), 25–36 (2009)

    Google Scholar 

  30. Lauren, M., Silwood, N., Chong, N., Low, S., McDonald, M., Rayburg, C., Yildiz, B., Pickl, S., Sanchez, R.: Maritime force protection study using mana and automatic co-evolution (ACE). In: Scythe: Proceedings and Bulletin of the International Data Farming Community, vol. 6, pp. 2–6 (2009)

    Google Scholar 

  31. Longbine, D.F.: Red teaming: past and present. Tech. rep., DTIC Document (2008)

    Google Scholar 

  32. Mackey, D., Dixon, D., Loncarish, T.: Combined arms and support task force evaluation model (castforem) update: methodologies. Tech. rep., Technical Document TRAC-WSMR-TD-01-012, US Army TRADOC Analysis Center, White Sands Missile Range, NM (2001)

    Google Scholar 

  33. MD (Ministry of Defense): Red teaming guide. Tech. rep., Wiltshure: The Development, Concepts and Doctrine Centre (2013)

    Google Scholar 

  34. Menadue, I., Lohmeyer, D., James, S., Holden, L.: jSWAT2-the application of simulation to support seminar wargaming. In: SimTecT (2009)

    Google Scholar 

  35. Millikan, J., Brennan, M., Gaertner, P.: Joint seminar wargame adjudication tool (jSWAT). In: Proceedings of the Land Warfare Conference (2005)

    Google Scholar 

  36. NATO: Bi-strategic command alternative analysis concept. Tech. rep., Supreme Allied Commander, Norfolk (2012)

    Google Scholar 

  37. Porter, M.E.: What is strategy? Harv. Bus. Rev. (November–December), 61–78 (1996)

    Google Scholar 

  38. Ranjeet, T.: Coevolutionary algorithms for the optimization of strategies for red teaming applications. Ph.D. thesis, Edith Cowan University (2012)

    Google Scholar 

  39. Ranjeet, T.R., Hingston, P., Lam, C.P., Masek, M.: Analysis of key installation protection using computerized red teaming. In: Proceedings of the Thirty-Fourth Australasian Computer Science Conference, vol. 113, pp. 137–144. Australian Computer Society, Darlinghurst (2011)

    Google Scholar 

  40. Rastegari, S., Hingston, P., Lam, C.P., Brand, M.: Testing a distributed denial of service defence mechanism using red teaming. In: IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA), pp. 23–29. IEEE, Ottawa (2013)

    Google Scholar 

  41. Schwarz, G.: Command and control in peace support operations model pax-approaching new challenges in the modeling of c2. Tech. rep., DTIC Document (2004)

    Google Scholar 

  42. Shafi, K., Abbass, H.A.: Biologically-inspired complex adaptive systems approaches to network intrusion detection. Inf. Secur. Tech. Rep. 12(4), 209–217 (2007)

    Article  Google Scholar 

  43. Teo, J., Abbass, H.A.: Multiobjectivity and complexity in embodied cognition. IEEE Trans. Evol. Comput. 9(4), 337–360 (2005)

    Article  Google Scholar 

  44. Thornton, C., Cohen, O., Denzinger, J., Boyd, J.E.: Automated testing of physical security: red teaming through machine learning. Comput. Intell. (2014)

    Google Scholar 

  45. Turing, A.M.: Computing machinery and intelligence. Mind, pp. 433–460 (1950)

    Google Scholar 

  46. Tzu, S.: The Art of War, p. 65. Translated by Samuel B. Griffith. Oxford University Press, New York (1963)

    Google Scholar 

  47. Upton, S.C., McDonald, M.J.: Automated red teaming using evolutionary algorithms. WG31–Computing Advances in Military OR (2003)

    Google Scholar 

  48. Upton, S.C., Johnson, S.K., McDonald, M.J.: Breaking blue: automated red teaming using evolvable simulations. In: GECCO 2004 (2004)

    Google Scholar 

  49. Von Clausewitz, C.: On War. Digireads. com Publishing (2004)

    Google Scholar 

  50. Wheeler, S.: Moving forward with computational red teaming. Tech. rep., Defence Science and Technology Organisation - DSTO, Australia (2012)

    Google Scholar 

  51. White, G.: The mathematical agent-a complex adaptive system representation in bactowars. In: First Workshop on Complex Adaptive Systems for Defence (2004)

    Google Scholar 

  52. White, G., Perston, R., Bowden, F.: Force flexibility modelling in bactowars. In: Proceedings of the International Congress on Modeling and Simulation (MODSIM), pp. 663–669 (2007)

    Google Scholar 

  53. Wittman Jr, R.L., Harrison, C.T.: Onesaf: A product line approach to simulation development. Tech. rep., DTIC Document (2001)

    Google Scholar 

  54. Yang, A., Abbass, H.A., Sarker, R.: Evolving agents for network centric warfare. In: Proceedings of the 2005 Workshops on Genetic and Evolutionary Computation, pp. 193–195. ACM, Washington (2005)

    Google Scholar 

  55. Yang, A., Abbass, H.A., Sarker, R.: Landscape dynamics in multi–agent simulation combat systems. In: AI 2004: Advances in Artificial Intelligence, pp. 39–50. Springer, Berlin (2005)

    Google Scholar 

  56. Yang, A., Abbass, H.A., Sarker, R.: Characterizing warfare in red teaming. IEEE Trans. Syst. Man Cybern. B 36(2), 268–285 (2006)

    Article  Google Scholar 

  57. Yang, A., Abbass, H.A., Sarker, R.: How hard is it to red team? In: Abbass, H.A., Essam, D. (eds.) Applications of Information Systems to Homeland Security and Defense, p. 46. IGI Global, Hershey (2006)

    Google Scholar 

  58. Zhao, W., Alam, S., Abbass, H.A.: Evaluating ground–air network vulnerabilities in an integrated terminal maneuvering area using co-evolutionary computational red teaming. Transp. Res. C Emerg. Technol. 29, 32–54 (2013)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Abbass, H.A. (2015). The Art of Red Teaming. In: Computational Red Teaming. Springer, Cham. https://doi.org/10.1007/978-3-319-08281-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08281-3_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08280-6

  • Online ISBN: 978-3-319-08281-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics