A Research of Behavior-Based Penetration Testing Model Of The Network

被引:0
|
作者
Wang LanFang [1 ]
Kou HaiZhou [1 ]
机构
[1] Huaiyin Inst Technol, Fac Comp Engn, Huaian, Peoples R China
关键词
Penetration testing model; Behavior anomaly detection; Vulnerabilities scanning; Network security;
D O I
10.1109/ICICEE.2012.444
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Two types of behavior-based penetration testing model of the network and their vulnerabilities were discussed in this paper. The paper provides a comprehensive method which includes three phases and a model based on behavior anomaly and detection. It can discover the attacks testing from the network access activities. The goal of this paper is intended to provide insight into the special networking attacks and offer preventive measures for thwarting. By developing a more thorough understanding of these types of attacks, it provides an armament of defensive measure and knowledge to lessen the penetratin testing and vulnerabilities being exploited. A realistic model was presented which comprised a variety of issues and counter measures including a basic process how these threats evolve, based on vulnerabilities,scanning and behavior anomaly detection.
引用
收藏
页码:1680 / 1683
页数:4
相关论文
共 50 条
  • [1] Research on Behavior-based Trojan Identification Model
    Wang, Haiyan
    Wu, Lijuan
    Huang, Limei
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING APPLICATIONS (CSEA 2015), 2015, : 648 - 654
  • [2] Research on a Behavior-Based Software Test Process Model
    Lu, Yongzhong
    Da, Simeng
    Yang, Jun
    Song, Junli
    Nie, Songlin
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 114 - +
  • [3] Fuzz Testing in Behavior-Based Robotics
    Delgado, Rodrigo
    Campusano, Miguel
    Bergel, Alexandre
    2021 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA 2021), 2021, : 9375 - 9381
  • [4] Behavior-based model construction
    Steffen, B
    Hungar, H
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2003, 2575 : 5 - 19
  • [5] Behavior-based model construction
    Hungar H.
    Steffen B.
    International Journal on Software Tools for Technology Transfer, 2004, 6 (1) : 4 - 14
  • [6] Research on a Behavior-based Active Controllable Defense Model and Its Application
    Guan, Zhitao
    He, Jietao
    Wu, Kehe
    Yuan, Shuai
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 687 - 691
  • [7] Model and behavior-based robotic goalkeeper
    Lausen, H
    Nielsen, J
    Nielsen, M
    Lima, P
    ROBOCUP 2003: ROBOT SOCCER WORLD CUP VII, 2004, 3020 : 169 - 180
  • [8] Behavior-based network security goes mainstream
    Geer, D
    COMPUTER, 2006, 39 (03) : 14 - 17
  • [9] Evaluation of the behavior-based equipment model
    Reithofer, Walter
    Loo, Johnson
    Mueller, Roland
    Eshkar, Uri
    Solid State Technology, 2000, 43 (10)
  • [10] An evaluation of the behavior-based equipment model
    Reithofer, W
    Loo, J
    Mueller, R
    Eshkar, U
    SOLID STATE TECHNOLOGY, 2000, 43 (10) : 121 - +