中国科学院沈阳自动化研究所机构知识库
Advanced  
SIA OpenIR  > 工业控制网络与系统研究室  > 会议论文
题名: Penetration testing automation assessment method based on rule tree
作者: Zhao JM(赵剑明); Shang WL(尚文利); Wan M(万明); Zeng P(曾鹏)
作者部门: 工业控制网络与系统研究室
会议名称: 2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER)
会议日期: June 8-12, 2015
会议地点: Shenyang, China
会议录: 2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER)
会议录出版者: IEEE
会议录出版地: Piscataway, NJ, USA
出版日期: 2015
页码: 1829-1833
收录类别: EI ; CPCI(ISTP)
ISSN号: 2379-7711
ISBN号: 978-1-4799-8730-6
关键词: penetration testing ; security assessment ; rule tree ; network security
摘要: With the application to assess the network and system security in some key fields, penetration testing assessment methods have been evolving into a popular research topic. However, the automation degree of penetration testing is at a lower level, and many parameters of security assessment method is uncertain. For these two problems above, we use rule trees method to achieve the automation process of penetration testing, and each chain of rule trees stores a complete the attack process. By using the result of penetration testing, we propose the security assessment process to meet the NIST guidelines, and it can make some uncertain parameters of security assessment clear. With the constant expansion of rule trees, the proposed method can improve the accuracy and effectiveness of security assessment.
语种: 英语
产权排序: 1
WOS记录号: WOS:000380502300332
Citation statistics:
内容类型: 会议论文
URI标识: http://ir.sia.cn/handle/173321/17388
Appears in Collections:工业控制网络与系统研究室_会议论文

Files in This Item: Download All
File Name/ File Size Content Type Version Access License
Penetration testing automation assessment method based on rule tree.pdf(357KB)会议论文--开放获取View Download

Recommended Citation:
Zhao JM,Shang WL,Wan M,et al. Penetration testing automation assessment method based on rule tree[C]. 见:2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER). Shenyang, China. June 8-12, 2015.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Zhao JM(赵剑明)]'s Articles
[Shang WL(尚文利)]'s Articles
[Wan M(万明)]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Zhao JM(赵剑明)]‘s Articles
[Shang WL(尚文利)]‘s Articles
[Wan M(万明)]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
文件名: Penetration testing automation assessment method based on rule tree.pdf
格式: Adobe PDF
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2016  中国科学院沈阳自动化研究所 - Feedback
Powered by CSpace