LightPEN: Optimizing the Vulnerability Exposures for Lightweight Penetration Test

S. Fugkeaw, Lyhour Hak, Nutsuda Ploysopond, Witchaya Apichonkit, Sirapop Lahankaew
{"title":"LightPEN: Optimizing the Vulnerability Exposures for Lightweight Penetration Test","authors":"S. Fugkeaw, Lyhour Hak, Nutsuda Ploysopond, Witchaya Apichonkit, Sirapop Lahankaew","doi":"10.1109/KST57286.2023.10086896","DOIUrl":null,"url":null,"abstract":"Penetration Testing (PenTest) is crucial to an organization’s system security. It helps ensure the confidentiality, integrity, and availability of the system and reduces exposures to future risks. Specifically, the PenTest process is usually initiated after the vulnerability assessment (VA) scanning where its results are used to undertake the PenTest. Significantly, PenTest requires expert testers to test each vulnerability found in the VA stage thoroughly. Hence, the process is expert-dependent and time-consuming. To optimize the set of vulnerabilities to be tested in the PenTest process, we introduce the scheme called LightPEN to support the extraction of known vulnerabilities obtained from existing sources such as local code scanning, notice from vendors and developers, and previous VA reports. In addition, our system provides exploitable scripts for the PenTest process. Finally, we conducted the experiment to demonstrate the efficiency of our proposed system.","PeriodicalId":351833,"journal":{"name":"2023 15th International Conference on Knowledge and Smart Technology (KST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 15th International Conference on Knowledge and Smart Technology (KST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KST57286.2023.10086896","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Penetration Testing (PenTest) is crucial to an organization’s system security. It helps ensure the confidentiality, integrity, and availability of the system and reduces exposures to future risks. Specifically, the PenTest process is usually initiated after the vulnerability assessment (VA) scanning where its results are used to undertake the PenTest. Significantly, PenTest requires expert testers to test each vulnerability found in the VA stage thoroughly. Hence, the process is expert-dependent and time-consuming. To optimize the set of vulnerabilities to be tested in the PenTest process, we introduce the scheme called LightPEN to support the extraction of known vulnerabilities obtained from existing sources such as local code scanning, notice from vendors and developers, and previous VA reports. In addition, our system provides exploitable scripts for the PenTest process. Finally, we conducted the experiment to demonstrate the efficiency of our proposed system.
LightPEN:优化轻量级渗透测试的漏洞暴露
渗透测试(PenTest)对组织的系统安全性至关重要。它有助于确保系统的机密性、完整性和可用性,并减少对未来风险的暴露。具体来说,测试过程通常在漏洞评估(VA)扫描之后启动,其结果用于进行测试。值得注意的是,PenTest需要专家测试人员彻底测试在VA阶段发现的每个漏洞。因此,这个过程依赖于专家,而且很耗时。为了优化在PenTest过程中要测试的漏洞集,我们引入了名为LightPEN的方案,以支持从现有来源(如本地代码扫描、供应商和开发人员的通知以及以前的VA报告)获取的已知漏洞的提取。此外,我们的系统为测试过程提供了可利用的脚本。最后,通过实验验证了系统的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信