Title :
Penetration testing automation assessment method based on rule tree
Author :
Jianming Zhao;Wenli Shang;Ming Wan;Peng Zeng
Author_Institution :
Lab. of Networked Control Systems, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang, China
fDate :
6/1/2015 12:00:00 AM
Abstract :
With the application to assess the network and system security in some key fields, penetration testing assessment methods have been evolving into a popular research topic. However, the automation degree of penetration testing is at a lower level, and many parameters of security assessment method is uncertain. For these two problems above, we use rule trees method to achieve the automation process of penetration testing, and each chain of rule trees stores a complete the attack process. By using the result of penetration testing, we propose the security assessment process to meet the NIST guidelines, and it can make some uncertain parameters of security assessment clear. With the constant expansion of rule trees, the proposed method can improve the accuracy and effectiveness of security assessment.
Keywords :
"Testing","Security","NIST","Automation","Guidelines","Communication networks","Databases"
Conference_Titel :
Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2015 IEEE International Conference on
Print_ISBN :
978-1-4799-8728-3
DOI :
10.1109/CYBER.2015.7288225