SIA OpenIR  > 工业控制网络与系统研究室
Penetration testing automation assessment method based on rule tree
Zhao JM(赵剑明); Shang WL(尚文利); Wan M(万明); Zeng P(曾鹏)
作者部门工业控制网络与系统研究室
会议名称2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER)
会议日期June 8-12, 2015
会议地点Shenyang, China
会议录名称2015 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER)
出版者IEEE
出版地Piscataway, NJ, USA
2015
页码1829-1833
收录类别EI ; CPCI(ISTP)
EI收录号20161402187771
WOS记录号WOS:000380502300332
产权排序1
ISSN号2379-7711
ISBN号978-1-4799-8730-6
关键词Penetration Testing Security Assessment Rule Tree Network Security
摘要With the application to assess the network and system security in some key fields, penetration testing assessment methods have been evolving into a popular research topic. However, the automation degree of penetration testing is at a lower level, and many parameters of security assessment method is uncertain. For these two problems above, we use rule trees method to achieve the automation process of penetration testing, and each chain of rule trees stores a complete the attack process. By using the result of penetration testing, we propose the security assessment process to meet the NIST guidelines, and it can make some uncertain parameters of security assessment clear. With the constant expansion of rule trees, the proposed method can improve the accuracy and effectiveness of security assessment.
语种英语
引用统计
被引频次:1[WOS]   [WOS记录]     [WOS相关记录]
文献类型会议论文
条目标识符http://ir.sia.cn/handle/173321/17388
专题工业控制网络与系统研究室
通讯作者Zhao JM(赵剑明)
作者单位Lab. of Networked Control Systems, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang, China
推荐引用方式
GB/T 7714
Zhao JM,Shang WL,Wan M,et al. Penetration testing automation assessment method based on rule tree[C]. Piscataway, NJ, USA:IEEE,2015:1829-1833.
条目包含的文件 下载所有文件
文件名称/大小 文献类型 版本类型 开放类型 使用许可
Penetration testing (357KB)会议论文 开放获取CC BY-NC-SA浏览 下载
个性服务
推荐该条目
保存到收藏夹
查看访问统计
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Zhao JM(赵剑明)]的文章
[Shang WL(尚文利)]的文章
[Wan M(万明)]的文章
百度学术
百度学术中相似的文章
[Zhao JM(赵剑明)]的文章
[Shang WL(尚文利)]的文章
[Wan M(万明)]的文章
必应学术
必应学术中相似的文章
[Zhao JM(赵剑明)]的文章
[Shang WL(尚文利)]的文章
[Wan M(万明)]的文章
相关权益政策
暂无数据
收藏/分享
文件名: Penetration testing automation assessment method based on rule tree.pdf
格式: Adobe PDF
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。