首页 | 本学科首页   官方微博 | 高级检索  
     

基于端口和编号的漏洞代码匹配方法研究
引用本文:张驰,罗森林.基于端口和编号的漏洞代码匹配方法研究[J].信息网络安全,2014(4):20-24.
作者姓名:张驰  罗森林
作者单位:北京理工大学信息系统及安全对抗实验中心,北京100081
基金项目:北京理工大学科技创新计划重大项目[2011CX01015]、国家242信息安全计划项目[2005C48]
摘    要:渗透测试是一种有效的安全测试方法,自动化渗透测试的关键问题之一是将发现的系统漏洞与已知漏洞利用代码进行匹配。文章提出基于开放端口和基于漏洞编号的两种匹配方法,通过将系统漏洞的端口号或漏洞编号,与漏洞利用代码中描述的端口号或漏洞编号对应检查完成匹配。实验结果表明,两种方法的查全率分别达到96.8%和90.3%,可以有效实现匹配。该方法可实际应用于自动化渗透测试。

关 键 词:系统漏洞  漏洞利用  渗透测试  自动化

Research on Matching Vulnerabilities and Exploitations based on Open Ports and References
ZHANG Chi,LUO Sen-lin.Research on Matching Vulnerabilities and Exploitations based on Open Ports and References[J].Netinfo Security,2014(4):20-24.
Authors:ZHANG Chi  LUO Sen-lin
Affiliation:(Information System and Security & Countermeasures Experimental Center, Beijing Institute of Technology, Beijing 100081, China)
Abstract:Penetration test is an effective security testing method. One of the key questions in automated penetration testing is to match discovered vulnerabilities and exploitations. Two matching methods based on open ports and references are put forward in this paper. One method is to compare the port numbers of system vulnerabilities with those described in exploitations. The other one is to compare the references of vulnerabilities with those in exploitations. The experimental results show that the recall ratios of the two methods reach 96.8%and 90.3%. Both of the two methods are effective. Furthermore, they can be applied to the penetration test in practical.
Keywords:system vulnerability  exploitation  penetration testing  automation
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号