Simulated Penetration Testing: From "Dijkstra" to "Turing Test++"

نویسنده

  • Jörg Hoffmann
چکیده

Penetration testing (pentesting) is a well established method for identifying security weaknesses, by conducting friendly attacks. Simulated pentesting automates this process, through designing a model of the system at hand, and using modelbased attack planning to generate the attacks. Classical planning variants of this idea are being used commercially by the pentesting industry since 2010. Such models can pinpoint potentially dangerous combinations of known vulnerabilities, but ignore the incomplete knowledge characteristic of hacking from the attacker’s point of view. Yet, ideally, the simulation should conduct its attacks the same way a real attacker would. Hence the ultimate goal is much more ambitious: to realistically simulate a human hacker. This is a grand vision indeed; e. g., the classical Turing Test can be viewed as a sub-problem. Taking a more practical perspective, the simulated pentesting model space spans a broad range of sequential decision making problems. Analyzing prior work in AI and other relevant areas, we derive a systematization of this model space, highlighting a multitude of interesting challenges to AI sequential decision making research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Side-Effects-free Database Penetration Testing

Penetration testing is one of the most traditional and widely used techniques to detect security flaws in systems by conducting simulated-attacks to the target systems. Organizations can develop a tool based on this technique to assess their own security systems or use third party softwares. However, besides its advantages in exploring real security vulnerabilities without false results, this t...

متن کامل

Simulated Penetration Testing and Mitigation Analysis

Penetration testing is a well-established practical concept for the identification of potentially exploitable security weaknesses and an important component of a security audit. Providing a holistic security assessment for networks consisting of several hundreds hosts is hardly feasible though without some sort of mechanization. Mitigation, prioritizing countermeasures subject to a given budget...

متن کامل

Comparision of Methods for Determining Bearing Capacity of Piles Using Standard Penetration Test (SPT) Data

In recent years, determining bearing capacity of piles from in-situ testing data as a complement to static and dynamic analysis has been used by geotechnical engineers. In this paper, different approaches for estimating bearing capacity of piles from SPT data are studied and compared. A new method based on N value from SPT is presented. Data averaging, failure zone and plunging failure of pil...

متن کامل

Comparision of Methods for Determining Bearing Capacity of Piles Using Standard Penetration Test (SPT) Data

In recent years, determining bearing capacity of piles from in-situ testing data as a complement to static and dynamic analysis has been used by geotechnical engineers. In this paper, different approaches for estimating bearing capacity of piles from SPT data are studied and compared. A new method based on N value from SPT is presented. Data averaging, &#10failure zone and plunging failure of p...

متن کامل

Evidence of Assurance: Laying the Foundation for a Credible Security Case

A security case bears considerable resemblance to a legal case, and demonstrates that security claims about a given system are valid. Persuasive argumentation plays a major role, but the credibility of the arguments and of the security case itself ultimately rests on a foundation of evidence. This article describes and gives examples of several of the kinds of evidence that can contribute to a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015