A Research of Behavior-Based Penetration Testing Model Of The Network

被引:0
作者
Wang LanFang [1 ]
Kou HaiZhou [1 ]
机构
[1] Huaiyin Inst Technol, Fac Comp Engn, Huaian, Peoples R China
来源
2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE) | 2012年
关键词
Penetration testing model; Behavior anomaly detection; Vulnerabilities scanning; Network security;
D O I
10.1109/ICICEE.2012.444
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Two types of behavior-based penetration testing model of the network and their vulnerabilities were discussed in this paper. The paper provides a comprehensive method which includes three phases and a model based on behavior anomaly and detection. It can discover the attacks testing from the network access activities. The goal of this paper is intended to provide insight into the special networking attacks and offer preventive measures for thwarting. By developing a more thorough understanding of these types of attacks, it provides an armament of defensive measure and knowledge to lessen the penetratin testing and vulnerabilities being exploited. A realistic model was presented which comprised a variety of issues and counter measures including a basic process how these threats evolve, based on vulnerabilities,scanning and behavior anomaly detection.
引用
收藏
页码:1680 / 1683
页数:4
相关论文
共 5 条
  • [1] Arsenault B, 2007, MICROSOFT SECURITY I
  • [2] GOPALAKRISHNA R, 2001, FRAMEWORK DISTRIBUTE
  • [3] Ramanathan A., 2002, Wades: A tool for distributed denial of service attack detection
  • [4] Skoudis E., 2006, COUNTER HACK RELOADE
  • [5] Teo L., 2003, P 1 IEEE INT WORKSH