DocumentCode :
3666901
Title :
Penetration testing automation assessment method based on rule tree
Author :
Jianming Zhao;Wenli Shang;Ming Wan;Peng Zeng
Author_Institution :
Lab. of Networked Control Systems, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang, China
fYear :
2015
fDate :
6/1/2015 12:00:00 AM
Firstpage :
1829
Lastpage :
1833
Abstract :
With the application to assess the network and system security in some key fields, penetration testing assessment methods have been evolving into a popular research topic. However, the automation degree of penetration testing is at a lower level, and many parameters of security assessment method is uncertain. For these two problems above, we use rule trees method to achieve the automation process of penetration testing, and each chain of rule trees stores a complete the attack process. By using the result of penetration testing, we propose the security assessment process to meet the NIST guidelines, and it can make some uncertain parameters of security assessment clear. With the constant expansion of rule trees, the proposed method can improve the accuracy and effectiveness of security assessment.
Keywords :
"Testing","Security","NIST","Automation","Guidelines","Communication networks","Databases"
Publisher :
ieee
Conference_Titel :
Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2015 IEEE International Conference on
Print_ISBN :
978-1-4799-8728-3
Type :
conf
DOI :
10.1109/CYBER.2015.7288225
Filename :
7288225
Link To Document :
بازگشت