2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER) 2015
DOI: 10.1109/cyber.2015.7288225
|View full text |Cite
|
Sign up to set email alerts
|

Penetration testing automation assessment method based on rule tree

Abstract: With the application to assess the network and system security in some key fields, penetration testing assessment methods have been evolving into a popular research topic. However, the automation degree of penetration testing is at a lower level, and many parameters of security assessment method is uncertain. For these two problems above, we use rule trees method to achieve the automation process of penetration testing, and each chain of rule trees stores a complete the attack process. By using the result of p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…T. AlSadhan and J.S. Park in paper [7] discussed the principles of and requirements for Information Security Continuous Monitoring (ISCM) and Risk Manangement in support of cyber defenses, real-world challenges.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…T. AlSadhan and J.S. Park in paper [7] discussed the principles of and requirements for Information Security Continuous Monitoring (ISCM) and Risk Manangement in support of cyber defenses, real-world challenges.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Under this, various tools comes which helps in fighting against any unwanted activities which can occur in due course of time. Common tools in cyber security are Security Incident and Event Management (SIEM), anti-virus, anti-malware [7], [14] .…”
Section: Mechanismmentioning
confidence: 99%
“…Penetration testing is prevalent in all software security practices [23], [24] and was defined as the art of finding an open door in 2002 [25]. Penetration testing is a postdeployment vulnerability assessment task that is conducted as an isolated test process in a manual and even ad hoc manner [26]- [29]. Penetration testing is used as a testing methodology to overcome security issues and fit with requirements for mobile, cloud, and web applications [18], [30].…”
Section: Applications Use Cloudmentioning
confidence: 99%
“…Penetration testing is a postdeployment vulnerability assessment task that is conducted as an isolated test process in a manual and even ad hoc fashion [26]- [29]. This testing consists of finding an open door or bugs in the implementation of computer systems [25] that are installed to compromise the system security by attempting to attack the system and exploit its vulnerabilities [67].…”
Section: A Rq1: What Is the Significance Of Performing Penetration Testing Of The MCC Application?mentioning
confidence: 99%