期刊文献+

基于AI的智能化渗透测试技术研究

Research on Intelligent Penetration Testing Technology Based on AI
下载PDF
导出
摘要 传统的渗透测试方式依赖测试人员的经验,而自动化测试通常基于已知的攻击模式和漏洞库,因此在面对复杂的网络场景时,难以实施灵活高效的渗透测试。针对上述问题,利用人工智能技术赋能自动化渗透测试,提出了基于强化认知决策的智能化渗透测试方案,通过拆解渗透攻击的各个阶段并提取攻击单元,设计迭代运行的系统架构,动态生成攻击行为,针对复杂的网络环境,利用强化学习实现攻击决策智能体的自进化学习,实现高效的智能化渗透测试。 Traditional penetration testing relies on the expertise of engineers,while automatic testing based on known attack patterns and vulnerability databases lacks the flexibility and efficiency to address complex network scenarios.To address these challenges,it proposes an intelligent penetration testing approach empowered by artificial intelligence techniques,based on reinforcement cognition decision-making.By decomposing the penetration attack into various stages and extracting attack units,an iterative system architecture is designed to dynamically generate attack behaviors.To tackle complex network environments,a reinforcement learning-based approach is employed to enable self-evolution capabilities of the attack decision-making agent,achieving efficient intelligent penetration testing.
作者 张小梅 郑涛 李长连 刘兵 熊琛 王昭顺 Zhang Xiaomei;Zheng Tao;Li Changlian;Liu Bing;Xiong Chen;Wang Zhaoshun(China United Network Communications Group Co.,Ltd.,Beijing 100033,China;China Information Technology Designing&Consulting Institute Co.,Ltd.,Beijing 100048,China;Bei-jing Moyun Technology Co.,Ltd.,Beijing 100094,China;University of Science and Technology Beijing,Beijing 100083,China)
出处 《邮电设计技术》 2024年第8期1-7,共7页 Designing Techniques of Posts and Telecommunications
关键词 渗透测试 强化认知决策 攻击决策智能体 自进化学习 智能化渗透测试 Penetration test Reinforcement cognition and decision-making Attack decision-making agent Self-evolution learning Intelligent penetration testing
  • 相关文献

参考文献8

二级参考文献21

  • 1刘海燕,杨洪路.基于网络的安全漏洞探测技术[J].装甲兵工程学院学报,2003,17(1):67-70. 被引量:7
  • 2Stuart McClure, Joel Scambray and George Kurtz. Hacking Exposed 7: Network Security Secrets & Solutions, Seventh Edition[M]. New York, US. McGraw-Hill Osborne Media, 2012.66-79. 被引量:1
  • 3Shakeel Ali (Author), Tedi Heriyanto. BackTrack 4: Assuring Security by Penetration Testing[M]. Birmingham, UK: Packt Publishing, 2(111.37-38. 被引量:1
  • 4Network Security Services. Penetration test[EB/OL], http:// en.wikipedia.org/wiki/Network_Security_Services, 2012-04-16. 被引量:1
  • 5National Institute of Standards and Technology. Technical Guide to Information Security Testing and Assessment[EB/OL]. http://csrc.nist. gov/publications/mstpubs/800-115/SP800-115.pdf,2012-12-18. 被引量:1
  • 6Open Information Systems Security Group. Information Systems Security Assessment Framework[EB/OL]. http://www.oissg.org/ issaf,2012-12-15. 被引量:1
  • 7Institute for Security and Open Methodologies. The Open Source Security Testing Methodology Manual[EB/OL}. http://www.isecom.org/, 2012-12-01/2012-12-15. 被引量:1
  • 8IndianZ. OSSTMM Test[EB/OL]. http://www.indianz.ch/ offenseosstmm.html, 2012-12-12. 被引量:1
  • 9PTES. Penetration Testing Execution Standard[EB/OL]. http://www. pentest -standard.org/index.php/Main Page, 2012-12-14. 被引量:1
  • 10Immunity, Inc. Canvas[EB/OL]. http://www.immunitysec.com, 2012-12-01. 被引量:1

共引文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部