Distributed Attack Deployment Capability for Modern Automated Penetration Testing

نویسندگان

چکیده

Cybersecurity is an ever-changing landscape. The threats of the future are hard to predict and even harder prepare for. This paper presents work designed for cybersecurity landscape tomorrow by creating a key support capability autonomous testing system. system test critical infrastructure what cyberattacks looks like. It proposes new type attack framework that provides precise granular control higher perception within set infected infrastructure. proposed intelligent, supports fetching execution arbitrary attacks, has small memory network footprint. facilitates rapid penetration as well evaluation where detection systems procedures underdeveloped require further improvement in preparation cyber-attacks.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automated Attack Planning using a Partially Observable Model for Penetration Testing of Industrial Control Systems

Context Industrial control systems govern important industrial processes as well as many other areas of daily life including building automation and the energy infrastructure. In the past, such systems were rarely networked if at all. Recently, however, a need for a higher degree of communication between different systems as well as other company resources has arisen. While leading to increased...

متن کامل

Towards Automated Deployment of Distributed Adaptation Systems

The development of a single software product is inefficient when groups of product are related since the development cost could be high. In addition, some products need to be self-adaptive in order to take into account the execution context changes. In this case, the implementation and management of the adaptation mechanisms variability is challenging especially for distributed systems due to t...

متن کامل

Declarative Testing and Deployment of Distributed Systems

System administrators and developers who deploy distributed systems have to deal with a deployment process that is largely manual and hard to reproduce. This paper describes how networks of computer systems can be reproducibly and automatically deployed from declarative specifications. Reproducibility also ensures that users can easily instantiate a test environment, before deploying the specif...

متن کامل

Enabling Automated Deployment for Cluster Computing in Distributed PC Classrooms

The rapid improvement of the microprocessor and network has made it possible for the PC cluster to compete with conventional supercomputers. Lots of high throughput type of applications can be satisfied by using the current desktop PCs, especially for those in PC classrooms, and leave the supercomputers for the demands from large scale high performance parallel computations. This paper presents...

متن کامل

Automated Password Extraction Attack on Modern Password Managers

To encourage users to use stronger and more secure passwords, modern web browsers offer users password management services, allowing users to save previously entered passwords locally onto their hard drives. We present Lupin, a tool that automatically extracts these saved passwords without the user’s knowledge. Lupin allows a network adversary to obtain passwords as long as the login form appea...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers

سال: 2022

ISSN: ['2073-431X']

DOI: https://doi.org/10.3390/computers11030033