Show simple item record

dc.contributor.author BADEA, Dan Gabriel
dc.contributor.author POCRIS, Sabin
dc.contributor.author ŢURCANU, Dinu
dc.date.accessioned 2026-02-18T16:25:06Z
dc.date.available 2026-02-18T16:25:06Z
dc.date.issued 2025
dc.identifier.citation BADEA, Dan Gabriel; Sabin POCRIS and Dinu ŢURCANU. Temperance: Adversary emulation framework. In: 24th RoEduNet International Conference Networking in Education and Research, Chisinau, Republic of Moldova, 17-19 September, 2025. Universitatea Politehnică din Bucureşti. IEEE, 2025, pp. 1-6. ISBN 979-8-3315-5714-0, eISBN 979-8-331-55713-3, ISSN 2068-1038, eISSN 2247-5443. en_US
dc.identifier.isbn 979-8-3315-5714-0
dc.identifier.isbn 979-8-331-55713-3
dc.identifier.issn 2068-1038
dc.identifier.issn 2247-5443
dc.identifier.uri https://doi.org/10.1109/RoEduNet68395.2025.11208385
dc.identifier.uri https://repository.utm.md/handle/5014/35306
dc.description Acces full text: https://doi.org/10.1109/RoEduNet68395.2025.11208385 en_US
dc.description.abstract This paper introduces and develops Temperance, an adversary emulation framework, which can be used to quickly reproduce a C2 (Command and Control) infrastructure by red team operators for simulating a cyber operation. The agent implanted into the target communicates with the C2 server, from which the operator has full remote control of the host. The network traffic that this agent generates can be distinguished from a normal user-generated one when using a standard C2 approach because of the beaconing behavior. The solution introduced and developed by this paper uses a dynamic-size hops cluster. A hop facilitates communication between the agents and the server in a decentralized message-passing style instead of simple traffic forwarding, like a normal proxy. The server's work has been delegated to the hops, requiring a lower number of active connections to be managed by it. This approach makes the infrastructure more fault-tolerant since the hop replacement is faster, simpler, and automatically. The operators can scale the operation since human intervention is needed less to maintain the infrastructure. Some defense techniques, like IP banning, become ineffective since the agents can use the remaining available hops from the cluster. To evaluate the solution, the network traffic of a normal user simulation, a baseline C2 server, and Temperance were captured to analyze the behavior. Two machine learning algorithms trained to detect the bea-coning behavior from the collected data were used to compare how well Temperance evades this detection. en_US
dc.language.iso en en_US
dc.publisher IEEE (Institute of Electrical and Electronics Engineers) en_US
dc.rights Attribution-NonCommercial-NoDerivs 3.0 United States *
dc.rights.uri http://creativecommons.org/licenses/by-nc-nd/3.0/us/ *
dc.subject agent en_US
dc.subject malware en_US
dc.subject evasion detection en_US
dc.subject beaconing behav-ior en_US
dc.title Temperance: Adversary emulation framework en_US
dc.type Article en_US


Files in this item

The following license files are associated with this item:

This item appears in the following Collection(s)

Show simple item record

Attribution-NonCommercial-NoDerivs 3.0 United States Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States

Search DSpace


Browse

My Account