A Research of Behavior-Based Penetration Testing Model Of The Network

被引:0
|
作者
Wang LanFang [1 ]
Kou HaiZhou [1 ]
机构
[1] Huaiyin Inst Technol, Fac Comp Engn, Huaian, Peoples R China
关键词
Penetration testing model; Behavior anomaly detection; Vulnerabilities scanning; Network security;
D O I
10.1109/ICICEE.2012.444
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Two types of behavior-based penetration testing model of the network and their vulnerabilities were discussed in this paper. The paper provides a comprehensive method which includes three phases and a model based on behavior anomaly and detection. It can discover the attacks testing from the network access activities. The goal of this paper is intended to provide insight into the special networking attacks and offer preventive measures for thwarting. By developing a more thorough understanding of these types of attacks, it provides an armament of defensive measure and knowledge to lessen the penetratin testing and vulnerabilities being exploited. A realistic model was presented which comprised a variety of issues and counter measures including a basic process how these threats evolve, based on vulnerabilities,scanning and behavior anomaly detection.
引用
收藏
页码:1680 / 1683
页数:4
相关论文
共 50 条
  • [21] INNES: An intelligent network penetration testing model based on deep reinforcement learning
    Qianyu Li
    Miao Hu
    Hao Hao
    Min Zhang
    Yang Li
    Applied Intelligence, 2023, 53 : 27110 - 27127
  • [22] Interactivism: A functional model of representation for behavior-based systems
    Cherian, S
    Troxell, W
    ADVANCES IN ARTIFICIAL LIFE, 1995, 929 : 691 - 703
  • [23] A Behavior-Based Model of Foraging Nectarivorous Echolocating Bats
    Nguyen, Thinh H.
    Vanderelst, Dieter
    FROM ANIMALS TO ANIMATS 17, SAB 2024, 2025, 14993 : 51 - 62
  • [24] A Design of Network Behavior-Based Malware Detection System for Android
    Qi, Yincheng
    Cao, Mingjing
    Zhang, Can
    Wu, Ruping
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2014, PT II, 2014, 8631 : 590 - 600
  • [25] Behavior-Based Advertising
    Shen, Qiaowei
    Villas-Boas, J. Miguel
    MANAGEMENT SCIENCE, 2018, 64 (05) : 2047 - 2064
  • [26] Behavior-based cellular automaton model for pedestrian dynamics
    Huang, Keke
    Zheng, Xiaoping
    Cheng, Yuan
    Yang, Yeqing
    APPLIED MATHEMATICS AND COMPUTATION, 2017, 292 : 417 - 424
  • [27] Proposing a Behavior-Based IDS Model for IoT Environment
    Abusafat, Fadi
    Pereira, Tiago
    Santos, Henrique
    INFORMATION SYSTEMS: RESEARCH, DEVELOPMENT, APPLICATIONS, EDUCATION (11TH SIGSAND/PLAIS EUROSYMPOSIUM 2018), 2018, 333 : 114 - 134
  • [28] Role defining using behavior-based clustering in telecommunication network
    Zhu, Tian
    Wang, Bai
    Wu, Bin
    Zhu, Chuanxi
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (04) : 3902 - 3908
  • [29] Behavior-based network access control: A proof-of-concept
    Frias-Martinez, Vanessa
    Stolfo, Salvatore J.
    Keromytis, Angelos D.
    INFORMATION SECURITY, PROCEEDINGS, 2008, 5222 : 175 - 190
  • [30] AN INTRINSIC BEHAVIOR-BASED MODEL FOR INTERACTIVE STRUCTURAL DESIGN
    GRUBBS, JH
    ACKROYD, MH
    LAW, KH
    ENGINEERING WITH COMPUTERS, 1987, 2 (04) : 185 - 198