期刊文献+

一种自动化的渗透测试系统的设计与实现 被引量:13

Design and implementation of automated penetration testing system
下载PDF
导出
摘要 为了减少传统渗透测试中人力资源投入的浪费,摆脱测试过程中对测试者专业技能的依赖,提高测试效率,缩短测试周期,完善测试结果,设计并实现了一种基于SNMP、多源漏洞库以及基于NASL插件的自动化渗透测试系统。该系统完全可以实现对被测网络及设备的信息探测、漏洞评估、渗透攻击和报告生成,可以自动完成渗透测试而不依赖于测试人员的知识经验,可以明显提高渗透测试的效率及其方便性、完整性和准确性。 To reduce the waste of human resources in traditional penetration testing,to shake off dependence on the professional skills of tester during the test process and improve test efficiency,shorten test cycle,and improve test results,this paper designed and implemented an automated penetration testing system based on SNMP,multi-source vulnerability database and a plug-in mechanism which was based on the NASL.The system could detect the network and device information well,vulnerability assessment,penetration attack,generate report.Then,it could automatically complete the penetration testing,not depending on the knowledge and experience of testers,significantly improved the efficiency and convenience,integrity,accuracy of penetration testing.
出处 《计算机应用研究》 CSCD 北大核心 2010年第4期1384-1387,共4页 Application Research of Computers
基金 国家科技支撑计划资助项目(2007BAH08B01)
关键词 简单网络管理协议 多源漏洞库 Nessus攻击脚本语言 渗透测试 SNMP multi-source vulnerability database NASL penetration testing
  • 相关文献

参考文献10

  • 1SCAMBRAY J,McCLURE S,KURTZ G.Hacking exposed[M].2nd ed.[S.l.]:Brooks,2001.
  • 2ARCE I,CACERES M.Automating penetration tests:a new challenge for the IS industry[M].[S.l.]:Core Security Tecnologies,2001.
  • 3周伟,王丽娜,张焕国.一种基于树结构的网络渗透测试系统[J].计算机与数字工程,2006,34(12):15-18. 被引量:5
  • 4徐正强.网络信息安全渗透测试平台研究[D].广州:广东工业大学,2008.
  • 5ISECOM.Open-source security testing methodology manual(OSSTMM2.2)[S/OL].(2006-12-13).http://isecom.securenetltd.com/osstmm.en.2.2.pdf.
  • 6German Federal Office for Information Security.A penetration test model[S].German:BSI,2005.
  • 7NIST.Technical guide to information security testing and assessment[S/OL].(2008-09).http://csrc.nist.gov/publications/nistpubs/800-115/SP800-115.pdf.
  • 8The MITRE Corporation.About CPE[EB/OL].(2007-12-19)[2009-03-29].http://cpe.mitre.org/about/index.html.
  • 9The MITRE Corporation.About CVE[EB/OL].(2008-06-04)[2009-03-29].http://cve.mitre.org/about/index.html.
  • 10The MITRE Corporation.About OVAL[EB/OL].(2008-03-06)[2009-04-04].http://oval.mitre.org/oval/about/index.html.

二级参考文献5

  • 1Gunter, M. ; Braun, T. Internet Service Monitoring with Mobile Agents[J]. IEEE Network, 2002,16(3) :22 -29
  • 2Weiming Shen. Distributed Manufacturing Scheduling using Intelligent Agents [ J ]. IEEE Intelligent Systems, 2002,17(1 ) :88 -94
  • 3Eric Cole. Hackers Beware. New Riders. 2001
  • 4Komiya, T. ; Ohsida, H. ; Takizawa, M. Mobile Agent Model for Distributed Objects Systems. Object'- Oriented Real- Time Distributed Computing, 2002. (ISORC 2002 ) [ C ]. Proceedings. Fifth IEEE International Symposium on. 2002 : 62 - 69
  • 5Bruce Schneier, Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons. 2000

共引文献5

同被引文献93

引证文献13

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部