Survey on Automated Penetration Testing Technology Research

被引:0
|
作者
Chen K. [1 ]
Lu H. [1 ]
Fang B.-X. [1 ]
Sun Y.-B. [1 ]
Su S. [1 ]
Tian Z.-H. [1 ]
机构
[1] Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou
来源
Ruan Jian Xue Bao/Journal of Software | 2024年 / 35卷 / 05期
关键词
attack graph; automated penetration testing; BDI-Agent; reinforcement learning;
D O I
10.13328/j.cnki.jos.007038
中图分类号
学科分类号
摘要
Penetration testing is an important means to discover the weaknesses of significant network information systems and protect network security. Traditional penetration testing relies heavily on manual labor and has high technical requirements for testers, limiting the popularization depth and breadth. By introducing artificial intelligence technology into the whole penetration testing process, automated penetration testing lowers the technical threshold of penetration testing based on greatly solving the problem of heavy dependence on manual labor. Automated penetration testing can be mainly divided into model-based and rule-based automated penetration testing, and the research of the two has their respective focuses. The former utilizes model algorithms to simulate hacker attacks with attention paid to attack scene perception and attack decision-making models. The latter concentrates on how to efficiently adapt attack rules and attack scenarios. This study mainly analyzes the implementation principles of automated penetration testing from three aspects of attack scenario modeling, penetration testing modeling, and decision-making reasoning model. Finally, the future development direction of automated penetration is explored from the dimensions of attack-defense confrontation and vulnerability combination utilization. © 2024 Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:2235 / 2267
页数:32
相关论文
共 158 条
  • [1] The state of security 2023 is resilient, (2023)
  • [2] Cybersecurity threatscape: q1 2021, (2021)
  • [3] NETSCOUT DDoS threat intelligence report—Latest cyber threat intelligence report, (2023)
  • [4] Wang X, Gui CN., Observation on the situation of network security vulnerabilities in the first half of 2022, China Information Security, 9, pp. 85-87, (2022)
  • [5] Thornberry WMM., National defense authorization act for fiscal year 2021, (2021)
  • [6] Biden JR., Interim national security strategic guidance, (2021)
  • [7] Biden JR., Executive order on improving the nation’s cybersecurity, (2021)
  • [8] Teoh CS, Mahmood AK., National cyber security strategies for digital economy, Proc. of the 2017 Int’l Conf. on Research and Innovation in Information Systems (ICRIIS), pp. 1-6, (2017)
  • [9] (2016)
  • [10] Regulations on the security protection of key information infrastructure (Order No. 745 of the state council of the People’s Republic of China), (2021)