首页> 外文会议>2016 Cybersecurity Symposium >Improving Penetration Testing Methodologies for Security-Based Risk Assessment
【24h】

Improving Penetration Testing Methodologies for Security-Based Risk Assessment

机译:改进用于基于安全性的风险评估的渗透测试方法

获取原文
获取原文并翻译 | 示例

摘要

The crisis of insecure software has resulted in a drastic increase in the frequency and impact of cyber attacks on businesses and individual users alike. The discipline of secure software engineering has evolved as a response to this trend, with the aim of producing software with fewer coding bugs or design flaws that result in exploitable vulnerabilities. However, secure software engineering is a young discipline, and many software artifacts in current use were created before, or in ignorance of, its development. Software practitioners would benefit greatly from a rigorous methodology for analyzing and validating software that has already entered its maintenance lifecycle. In this paper, we present a combined penetrating testing methodology that incorporates strengths of several existing approaches, with the goal to understand their utility and benefit for analyzing security of existing software programs. We exercise this methodology through a case study applied to a popular tool used by many network security practitioners: Wireshark. As a contribution, our study illustrates the benefits of a combined approach and outlines recommendations for a holistic method that will improve security-based risk assessment. Specifically, we show how application of rigorous test-driven threat modeling can produce better abuse cases, which can in turn be used to inform and more precisely define penetration testing activities.
机译:不安全软件的危机导致网络攻击对企业和个人用户的频率和影响急剧增加。为了响应这种趋势,安全软件工程学的学科得到了发展,其目的是生产具有较少编码漏洞或设计缺陷的软件,从而减少可利用漏洞的可能性。但是,安全软件工程是一门新兴的学科,并且当前使用的许多软件工件都是在其开发之前或对其开发不了解的情况下创建的。严格的分析和验证已经进入其维护生命周期的软件的方法论将使软件从业人员从中受益匪浅。在本文中,我们提出了一种结合渗透测试方法,该方法结合了几种现有方法的优势,旨在了解它们的效用和对分析现有软件程序安全性的好处。我们通过将案例研究应用于许多网络安全从业者使用的流行工具来实践这种方法:Wireshark。作为贡献,我们的研究阐明了组合方法的好处,并概述了将改善基于安全性的风险评估的整体方法的建议。具体而言,我们展示了如何使用严格的测试驱动的威胁建模来产生更好的滥用案例,这些案例又可以用于告知和更准确地定义渗透测试活动。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号