Permeation test comprehensive effect evaluation method and system based on attack tree
A technology of penetration testing and attack effects, applied in the field of network security, can solve the problems of ignoring process decision-making, insufficient research on correlation, etc., and achieve the effect of strong flexibility and scalability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The technical solution of the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.
[0044] Such as figure 1 As shown, an attack tree-based penetration test comprehensive effect evaluation method, the steps are: execute the corresponding network penetration attack based on the preset penetration test task and obtain the attack data, and obtain the original attack result index data; Attacks are carried out in stages, which are represented as attack subtrees at different stages in the attack tree model; therefore, it is necessary to extract the index data corresponding to the attack subtree, and use the method of combining subjective weighting and objective weighting to analyze each index According to the index type, select the corresponding evaluation model, including the gray relational evaluation model, the evaluation model approaching the ideal solution, and the fuzzy comprehensive evaluation model....
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


