DocumentCode
3666901
Title
Penetration testing automation assessment method based on rule tree
Author
Jianming Zhao;Wenli Shang;Ming Wan;Peng Zeng
Author_Institution
Lab. of Networked Control Systems, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang, China
fYear
2015
fDate
6/1/2015 12:00:00 AM
Firstpage
1829
Lastpage
1833
Abstract
With the application to assess the network and system security in some key fields, penetration testing assessment methods have been evolving into a popular research topic. However, the automation degree of penetration testing is at a lower level, and many parameters of security assessment method is uncertain. For these two problems above, we use rule trees method to achieve the automation process of penetration testing, and each chain of rule trees stores a complete the attack process. By using the result of penetration testing, we propose the security assessment process to meet the NIST guidelines, and it can make some uncertain parameters of security assessment clear. With the constant expansion of rule trees, the proposed method can improve the accuracy and effectiveness of security assessment.
Keywords
"Testing","Security","NIST","Automation","Guidelines","Communication networks","Databases"
Publisher
ieee
Conference_Titel
Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2015 IEEE International Conference on
Print_ISBN
978-1-4799-8728-3
Type
conf
DOI
10.1109/CYBER.2015.7288225
Filename
7288225
Link To Document