SIA OpenIR  > 工业控制网络与系统研究室
Penetration testing automation assessment method based on rule tree
Zhao JM(赵剑明); Shang WL(尚文利); Wan M(万明); Zeng P(曾鹏)
Department工业控制网络与系统研究室
Conference Name2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER)
Conference DateJune 8-12, 2015
Conference PlaceShenyang, China
Source Publication2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER)
PublisherIEEE
Publication PlacePiscataway, NJ, USA
2015
Pages1829-1833
Indexed ByEI ; CPCI(ISTP)
EI Accession number20161402187771
WOS IDWOS:000380502300332
Contribution Rank1
ISSN2379-7711
ISBN978-1-4799-8730-6
KeywordPenetration Testing Security Assessment Rule Tree Network Security
AbstractWith the application to assess the network and system security in some key fields, penetration testing assessment methods have been evolving into a popular research topic. However, the automation degree of penetration testing is at a lower level, and many parameters of security assessment method is uncertain. For these two problems above, we use rule trees method to achieve the automation process of penetration testing, and each chain of rule trees stores a complete the attack process. By using the result of penetration testing, we propose the security assessment process to meet the NIST guidelines, and it can make some uncertain parameters of security assessment clear. With the constant expansion of rule trees, the proposed method can improve the accuracy and effectiveness of security assessment.
Language英语
Citation statistics
Document Type会议论文
Identifierhttp://ir.sia.cn/handle/173321/17388
Collection工业控制网络与系统研究室
Corresponding AuthorZhao JM(赵剑明)
AffiliationLab. of Networked Control Systems, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang, China
Recommended Citation
GB/T 7714
Zhao JM,Shang WL,Wan M,et al. Penetration testing automation assessment method based on rule tree[C]. Piscataway, NJ, USA:IEEE,2015:1829-1833.
Files in This Item: Download All
File Name/Size DocType Version Access License
Penetration testing (357KB)会议论文 开放获取CC BY-NC-SAView Download
Related Services
Recommend this item
Bookmark
Usage statistics
Export to Endnote
Google Scholar
Similar articles in Google Scholar
[Zhao JM(赵剑明)]'s Articles
[Shang WL(尚文利)]'s Articles
[Wan M(万明)]'s Articles
Baidu academic
Similar articles in Baidu academic
[Zhao JM(赵剑明)]'s Articles
[Shang WL(尚文利)]'s Articles
[Wan M(万明)]'s Articles
Bing Scholar
Similar articles in Bing Scholar
[Zhao JM(赵剑明)]'s Articles
[Shang WL(尚文利)]'s Articles
[Wan M(万明)]'s Articles
Terms of Use
No data!
Social Bookmark/Share
File name: Penetration testing automation assessment method based on rule tree.pdf
Format: Adobe PDF
All comments (0)
No comment.
 

Items in the repository are protected by copyright, with all rights reserved, unless otherwise indicated.