• DocumentCode
    3666901
  • Title

    Penetration testing automation assessment method based on rule tree

  • Author

    Jianming Zhao;Wenli Shang;Ming Wan;Peng Zeng

  • Author_Institution
    Lab. of Networked Control Systems, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang, China
  • fYear
    2015
  • fDate
    6/1/2015 12:00:00 AM
  • Firstpage
    1829
  • Lastpage
    1833
  • Abstract
    With the application to assess the network and system security in some key fields, penetration testing assessment methods have been evolving into a popular research topic. However, the automation degree of penetration testing is at a lower level, and many parameters of security assessment method is uncertain. For these two problems above, we use rule trees method to achieve the automation process of penetration testing, and each chain of rule trees stores a complete the attack process. By using the result of penetration testing, we propose the security assessment process to meet the NIST guidelines, and it can make some uncertain parameters of security assessment clear. With the constant expansion of rule trees, the proposed method can improve the accuracy and effectiveness of security assessment.
  • Keywords
    "Testing","Security","NIST","Automation","Guidelines","Communication networks","Databases"
  • Publisher
    ieee
  • Conference_Titel
    Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2015 IEEE International Conference on
  • Print_ISBN
    978-1-4799-8728-3
  • Type

    conf

  • DOI
    10.1109/CYBER.2015.7288225
  • Filename
    7288225