Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Efficient Penetration Testing Path Planning Based on Reinforcement Learning with Episodic Memory

    Ziqiao Zhou1, Tianyang Zhou1,*, Jinghao Xu2, Junhu Zhu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2613-2634, 2024, DOI:10.32604/cmes.2023.028553

    Abstract Intelligent penetration testing is of great significance for the improvement of the security of information systems, and the critical issue is the planning of penetration test paths. In view of the difficulty for attackers to obtain complete network information in realistic network scenarios, Reinforcement Learning (RL) is a promising solution to discover the optimal penetration path under incomplete information about the target network. Existing RL-based methods are challenged by the sizeable discrete action space, which leads to difficulties in the convergence. Moreover, most methods still rely on experts’ knowledge. To address these issues, this paper… More >

  • Open Access

    ARTICLE

    Efficacy of Unconventional Penetration Testing Practices

    Bandar Abdulrhman Bin Arfaj1, Shailendra Mishra2,*, Mohammed Alshehri1

    Intelligent Automation & Soft Computing, Vol.31, No.1, pp. 223-239, 2022, DOI:10.32604/iasc.2022.019485

    Abstract The financial and confidential cost of cyberattack has presented a significant loss to the organization and government where the privacy of worthless information has become vulnerable to cyber threat. In terms of efforts implemented to avoid this risk, the cyberattack continues to evolve, making the cybersecurity systems weekend. This has necessitated the importance of comprehensive penetration testing, assessment techniques, and tools to analyze and present the currently available unconventional penetration techniques and tactics to test and examine their key features and role in supporting cybersecurity and measure their effectiveness. The importance of cyberspace and its… More >

  • Open Access

    ARTICLE

    An Automated Penetration Semantic Knowledge Mining Algorithm Based on Bayesian Inference

    Yichao Zang1,*, Tairan Hu2, Tianyang Zhou2, Wanjiang Deng3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2573-2585, 2021, DOI:10.32604/cmc.2021.012220

    Abstract Mining penetration testing semantic knowledge hidden in vast amounts of raw penetration testing data is of vital importance for automated penetration testing. Associative rule mining, a data mining technique, has been studied and explored for a long time. However, few studies have focused on knowledge discovery in the penetration testing area. The experimental result reveals that the long-tail distribution of penetration testing data nullifies the effectiveness of associative rule mining algorithms that are based on frequent pattern. To address this problem, a Bayesian inference based penetration semantic knowledge mining algorithm is proposed. First, a directed More >

Displaying 1-10 on page 1 of 3. Per Page