Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network-oriented penetration testing scheme automatic-generation method

A penetration testing and automatic generation technology, applied in the field of network information security, can solve the problems of too many irrelevant nodes and no abstract model of penetration testing scheme, so as to reduce the search effect.

Inactive Publication Date: 2012-07-04
BEIHANG UNIV
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the current penetration testing process is always too much manual involvement
[0006] Research on the generation of penetration testing schemes, the current problem is: there is no clear abstract model of penetration testing schemes, which is the basis for automatic generation of penetration testing schemes
The problem with this is: simply searching in one direction will cause too many irrelevant nodes to be searched

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network-oriented penetration testing scheme automatic-generation method
  • Network-oriented penetration testing scheme automatic-generation method
  • Network-oriented penetration testing scheme automatic-generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0038] 1. If figure 1As shown, the present invention provides a method for automatically generating a network-oriented penetration testing scheme, which includes four processing flows: "planning", "information collection", "penetration map generation", and "penetration testing scheme generation". Among them, the "planning" processing flow is to give the penetration testing information about the penetration testing. The "information collection" processing flow is to collect vulnerability information on the network according to the set penetration test information, where the penetration test information includes penetration test constraints and penetration test objectives; connection relationship. The processing flow of "penetration graph generation" is to generate a penetration graph from the initial condition node of the penetration test to the target...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network-oriented penetration testing scheme automatic-generation method. The technical problem that the conventional penetration testing scheme is formulated mainly by a penetration tester according to a penetration testing target so that the penetration tester always participates in penetration testing details is solved. The method consists of four flows, namely 'planning', 'information collection', 'generation of a penetration diagram' and 'generation of a penetration testing scheme'. The problem that overmany unrelated nodes can be found by a searching-based penetration diagram generation algorithm is solved by a penetration diagram generation algorithm combining backward searching and forward searching; and the problem of absence of an abstract model and a generation algorithm for the penetration testing scheme is solved by modeling the penetration testing scheme and providing the generation algorithm. By the method, the penetration tester is freed from the penetration testing details, and the penetration testing scheme can be quickly and accurately generated.

Description

technical field [0001] The invention belongs to the field of network information security, in particular to a method for automatically generating a network-oriented penetration testing scheme. Background technique [0002] Penetration testing is a security test in which testers simulate controlled attacks to find ways to bypass security features of applications, systems, and networks. Penetration testing, as a professional security service, has gradually begun to get more applications at home and abroad. Usually, penetration testing has a clear scope, goal and time limit. It is generally used to test the real-time status of enterprise security and the effect of security measures. It is suitable for security audit departments to conduct assessment tests, and can also be part of large-scale assessments. [0003] In the penetration testing process, the penetration testing personnel mainly rely on their own experience and knowledge to plan a penetration testing process, and the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26
Inventor 夏春和梁晓艳沈路薄阳胡俊顺
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products