Simulated Penetration Testing: From "Dijkstra" to "Turing Test++"
نویسنده
چکیده
Penetration testing (pentesting) is a well established method for identifying security weaknesses, by conducting friendly attacks. Simulated pentesting automates this process, through designing a model of the system at hand, and using modelbased attack planning to generate the attacks. Classical planning variants of this idea are being used commercially by the pentesting industry since 2010. Such models can pinpoint potentially dangerous combinations of known vulnerabilities, but ignore the incomplete knowledge characteristic of hacking from the attacker’s point of view. Yet, ideally, the simulation should conduct its attacks the same way a real attacker would. Hence the ultimate goal is much more ambitious: to realistically simulate a human hacker. This is a grand vision indeed; e. g., the classical Turing Test can be viewed as a sub-problem. Taking a more practical perspective, the simulated pentesting model space spans a broad range of sequential decision making problems. Analyzing prior work in AI and other relevant areas, we derive a systematization of this model space, highlighting a multitude of interesting challenges to AI sequential decision making research.
منابع مشابه
Towards Side-Effects-free Database Penetration Testing
Penetration testing is one of the most traditional and widely used techniques to detect security flaws in systems by conducting simulated-attacks to the target systems. Organizations can develop a tool based on this technique to assess their own security systems or use third party softwares. However, besides its advantages in exploring real security vulnerabilities without false results, this t...
متن کاملSimulated Penetration Testing and Mitigation Analysis
Penetration testing is a well-established practical concept for the identification of potentially exploitable security weaknesses and an important component of a security audit. Providing a holistic security assessment for networks consisting of several hundreds hosts is hardly feasible though without some sort of mechanization. Mitigation, prioritizing countermeasures subject to a given budget...
متن کاملComparision of Methods for Determining Bearing Capacity of Piles Using Standard Penetration Test (SPT) Data
In recent years, determining bearing capacity of piles from in-situ testing data as a complement to static and dynamic analysis has been used by geotechnical engineers. In this paper, different approaches for estimating bearing capacity of piles from SPT data are studied and compared. A new method based on N value from SPT is presented. Data averaging, failure zone and plunging failure of pil...
متن کاملComparision of Methods for Determining Bearing Capacity of Piles Using Standard Penetration Test (SPT) Data
In recent years, determining bearing capacity of piles from in-situ testing data as a complement to static and dynamic analysis has been used by geotechnical engineers. In this paper, different approaches for estimating bearing capacity of piles from SPT data are studied and compared. A new method based on N value from SPT is presented. Data averaging, 
failure zone and plunging failure of p...
متن کاملEvidence of Assurance: Laying the Foundation for a Credible Security Case
A security case bears considerable resemblance to a legal case, and demonstrates that security claims about a given system are valid. Persuasive argumentation plays a major role, but the credibility of the arguments and of the security case itself ultimately rests on a foundation of evidence. This article describes and gives examples of several of the kinds of evidence that can contribute to a ...
متن کامل