Automatic penetration testing method based on AI

A penetration testing and automatic technology, applied in neural learning methods, biological neural network models, platform integrity maintenance, etc.

Pending Publication Date: 2020-08-04
北京墨云科技有限公司
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention aims to solve the above-mentioned technical problems existing in penetration testing in the prior art when manual services and automated tools are used, and provides an automated penetration testing method based on AI, which can effectively improve the stability and efficiency of penetration testing services, reduce Reliance on external penetration testing service personnel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic penetration testing method based on AI
  • Automatic penetration testing method based on AI
  • Automatic penetration testing method based on AI

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0103] Such as figure 1 As shown, the present embodiment includes the following steps during use:

[0104] S1. Penetration test task setting: including setting the penetration target, parameters, whether to automatically springboard the attack, and start the task;

[0105] S2. Collection of attack surface, intelligence information, and vulnerability information: the decision-making brain module 420 generates a driving instruction according to the target IP or domain name set by the penetration testing task and sends it to the information collection module 100, and the information collection module 100 collects the attack surface and intelligence according to the driving instruction information, vulnerability information and transmit the attack surface, intelligence information, and vulnerability information to the decision-making brain module 420; figure 2 As shown, step S2 further includes the following steps:

[0106] S21. The decision-making brain module 420 judges the t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an automatic penetration test method based on AI. The method comprises the following steps: S1, setting a penetration test task; s2, collecting information; s3, performing penetration attack; s4, performing iterative attack judgment; s5, carrying out post-permeation; s6, resetting the vulnerability risk priority; and s7, carrying out test report generation. According to theAI-based automatic penetration test method provided by the invention, the penetration test stability and efficiency can be effectively improved, and the dependence on external penetration test service personnel is reduced.

Description

technical field [0001] The invention relates to the technical field of network data security, in particular to an AI-based automated penetration testing method. Background technique [0002] Penetration test is to completely simulate the attack technology and vulnerability discovery technology that hackers may use, conduct in-depth detection of the security of the target system, discover the most vulnerable link of the system, discover complex, interrelated security problems, and deeper weaknesses , and report the intrusion process and details to the user. The penetration testing workflow is mainly divided into three stages: pre-attack stage, attack stage, and post-attack stage. Pre-attack stage: The purpose is to collect information. Generally, information is obtained by detecting and analyzing targets through tools such as basic network information acquisition and regular vulnerability scanning. Attack phase: The purpose is to attack the target and obtain certain permis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F16/951G06N3/04G06N3/08
CPCG06F21/577G06F16/951G06N3/084G06N3/045
Inventor 何晓刚谢鑫刘兵董昊辰高晓辉左厚德
Owner 北京墨云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products