Iterative attack method of automatic penetration test system based on AI

A penetration testing and iterative technique, applied in the field of iterative attacks

Active Publication Date: 2020-08-25
北京墨云科技有限公司
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention aims to solve the above-mentioned technical problems existing in penetration testing in the prior art when manual services and automated tools are used, and provides an iterative attack method for an automated penetration testing system based on AI, which can effectively improve the stability and performance of penetration testing. efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Iterative attack method of automatic penetration test system based on AI
  • Iterative attack method of automatic penetration test system based on AI
  • Iterative attack method of automatic penetration test system based on AI

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] Such as figure 1 As shown, the present embodiment includes the following steps during use:

[0096] S1. Penetration test task setting: including setting the penetration target, parameters, whether to automatically springboard the attack, and start the task;

[0097] S2. Attack surface, intelligence data, and vulnerability information collection: the decision-making brain module 420 generates a driving instruction according to the target IP or domain name set by the penetration testing task and sends it to the information collection module 100, and the information collection module 100 collects the attack surface and intelligence according to the driving instruction Data, vulnerability information and vulnerability information are sent to the decision-making brain module 420; figure 2 As shown, step S2 further includes the following steps:

[0098] S21. The decision-making brain module 420 judges the type of the penetration testing task, and enters step S22 when the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an iterative attack method of an automatic penetration test system based on AI. The iterative attack method comprises the following steps: S1, setting a penetration test task;s2, collecting vulnerability information; s3, performing penetration attack; and S4, performing iterative attack judgment. The iterative attack method of the automatic penetration test system based onAI provided by the invention can effectively improve the stability and efficiency of the penetration test.

Description

technical field [0001] The invention relates to the technical field of network data security, in particular to an iterative attack method of an AI-based automated penetration testing system. Background technique [0002] Penetration test is to completely simulate the attack technology and vulnerability discovery technology that hackers may use, conduct in-depth detection of the security of the target system, discover the most vulnerable link of the system, discover complex, interrelated security problems, and deeper weaknesses , and report the intrusion process and details to the user. The penetration testing workflow is mainly divided into three stages: pre-attack stage, attack stage, and post-attack stage. Pre-attack stage: The purpose is to collect information. Generally, information is obtained by detecting and analyzing targets through tools such as basic network information acquisition and regular vulnerability scanning. Attack phase: The purpose is to attack the ta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F16/951G06N3/04G06N3/08
CPCG06F21/577G06F16/951G06N3/084G06N3/045Y02D30/50
Inventor 何晓刚谢鑫赵岱翀何础成郭路路尉俊强
Owner 北京墨云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products