CIPHER: Cybersecurity Intelligent Penetration-Testing Helper for Ethical Researcher

被引:1
|
作者
Pratama, Derry [1 ]
Suryanto, Naufal [2 ]
Adiputra, Andro Aprila [1 ]
Le, Thi-Thu-Huong [3 ]
Kadiptya, Ahmada Yusril [1 ]
Iqbal, Muhammad [1 ]
Kim, Howon [1 ]
机构
[1] Pusan Natl Univ, Sch Comp Sci & Engn, Busan 46241, South Korea
[2] Pusan Natl Univ, IoT Res Ctr, Busan 46241, South Korea
[3] Pusan Natl Univ, Blockchain Platform Res Ctr, Busan 46241, South Korea
关键词
penetration testing; large language model; pentesting LLM; AI penetration testing assistant; domain specific LLM; LLM evaluation; vulnerabillity detection;
D O I
10.3390/s24216878
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Penetration testing, a critical component of cybersecurity, typically requires extensive time and effort to find vulnerabilities. Beginners in this field often benefit from collaborative approaches with the community or experts. To address this, we develop Cybersecurity Intelligent Penetration-testing Helper for Ethical Researchers (CIPHER), a large language model specifically trained to assist in penetration testing tasks as a chatbot. Unlike software development, penetration testing involves domain-specific knowledge that is not widely documented or easily accessible, necessitating a specialized training approach for AI language models. CIPHER was trained using over 300 high-quality write-ups of vulnerable machines, hacking techniques, and documentation of open-source penetration testing tools augmented in an expert response structure. Additionally, we introduced the Findings, Action, Reasoning, and Results (FARR) Flow augmentation, a novel method to augment penetration testing write-ups to establish a fully automated pentesting simulation benchmark tailored for large language models. This approach fills a significant gap in traditional cybersecurity Q&A benchmarks and provides a realistic and rigorous standard for evaluating LLM's technical knowledge, reasoning capabilities, and practical utility in dynamic penetration testing scenarios. In our assessments, CIPHER achieved the best overall performance in providing accurate suggestion responses compared to other open-source penetration testing models of similar size and even larger state-of-the-art models like Llama 3 70B and Qwen1.5 72B Chat, particularly on insane difficulty machine setups. This demonstrates that the current capabilities of general large language models (LLMs) are insufficient for effectively guiding users through the penetration testing process. We also discuss the potential for improvement through scaling and the development of better benchmarks using FARR Flow augmentation results.
引用
收藏
页数:37
相关论文
共 28 条
  • [1] Collaborative Penetration-testing and Analysis Toolkit (CPAT)
    Rushing, Darrien
    Guidry, Jason
    Alkadi, Ihssan
    2015 IEEE AEROSPACE CONFERENCE, 2015,
  • [2] Virtuous human hacking: The ethics of social engineering in penetration-testing
    Hatfield, Joseph M.
    COMPUTERS & SECURITY, 2019, 83 : 354 - 366
  • [3] Ethical hacking and penetration testing strengthening cybersecurity posture through offensive security measures
    Godbole, Aditee
    Dhabliya, Ritika
    Deshpande, Vivek
    Sivakumar, S. A.
    Shankar, B. Maruthi
    Khetani, Vinit
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (04): : 1295 - 1305
  • [4] ICVTest: A Practical Black-Box Penetration Testing Framework for Evaluating Cybersecurity of Intelligent Connected Vehicles
    Zhang, Haichun
    Wang, Jie
    Wang, Yijie
    Li, Minfeng
    Song, Jinghan
    Liu, Zhenglin
    APPLIED SCIENCES-BASEL, 2024, 14 (01):
  • [5] Text Command Intelligent Understanding for Cybersecurity Testing
    Yi, Junkai
    Liu, Yuan
    Jiang, Zhongbai
    Liu, Zhen
    ELECTRONICS, 2024, 13 (21)
  • [6] A Cybersecurity Knowledge Graph Completion Method for Penetration Testing
    Wang, Peng
    Liu, Jingju
    Zhong, Xiaofeng
    Zhou, Shicheng
    ELECTRONICS, 2023, 12 (08)
  • [7] Characterizing Attacker Behavior in a Cybersecurity Penetration Testing Competition
    Munaiah, Nuthan
    Rahman, Akond
    Pelletier, Justin
    Williams, Laurie
    Meneely, Andrew
    2019 13TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2019), 2019, : 277 - 282
  • [8] Fundamentals of Ethical Hacking and Penetration Testing
    Khokhar, Umar Mujahid
    Binh Tran
    PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 149 - 150
  • [9] Reinforcement Learning for Intelligent Penetration Testing
    Ghanem, Mohamed C.
    Chen, Thomas M.
    PROCEEDINGS OF THE 2018 SECOND WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4), 2018, : 185 - 192
  • [10] Application of Robotic Exploration Principles to the Challenge of Cybersecurity Penetration Testing
    Straub, Jeremy
    2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR, 2024, : 255 - 261