Approaches to ethical hacking: expanding conceptual frameworks for research

L. Provost, Rebecca Labitt, Danielle Alexandre, Asher Rodriguez
{"title":"Approaches to ethical hacking: expanding conceptual frameworks for research","authors":"L. Provost, Rebecca Labitt, Danielle Alexandre, Asher Rodriguez","doi":"10.1145/3384217.3386400","DOIUrl":null,"url":null,"abstract":"The ever-changing digital landscape remains more vulnerable than ever with cybersecurity becoming increasingly important to the success of the digital economy and its stakeholders. With models including cloud computing, mobility and IoT systems, understanding how tools and methodologies for security testing have evolved is an important task. In particular, more sophisticated approaches to vulnerability assessment are currently used and necessary to address more complex security vulnerabilities. One of the central tools used in vulnerability testing is penetration testing, along with other techniques that are more broadly classified as ethical hacking. This study addresses the following research questions. (1) What are the current research trends including, current terminology and concepts, used in ethical hacking? (2) What are current challenges and best practices in ethical hacking? (3) In our multiple case-study, how do these findings relate to each case of our three industry case studies in ethical hacking? We began by conducting a systematic review of 112 articles of peer-reviewed journals, conference proceedings and edited books from the time period of 2012-2019 to address these questions. We ranked the techniques presented in the 42 papers, a subset of the original set, based on theoretical merits, transparency of information and additional strict inclusion/exclusion criteria. Next, we provide an analysis of current research in the field including application scenarios, models, methodologies and tools. This included the completion of a literature review that includes a conceptual analysis of current terminology used in ethical hacking, both in research and in practice. We then summarize our analysis, findings and suggestions for improvements in conceptual frameworks for research in this area. Lastly, we used our resulting conceptual framework in a multi-case study approach to three ethical hacking cases for three industry participants. These results include details of the ethical hacking process in each case. In concluding our study, we argue that current frameworks for research are limited in scope and unable to address the complexity of ethical hacking within complex cybersecurity ecosystems. The result of the literature review and multiple-case study research is an improved framework for research that encompasses a multitude of factors and attributes of major attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.","PeriodicalId":205173,"journal":{"name":"Proceedings of the 7th Symposium on Hot Topics in the Science of Security","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 7th Symposium on Hot Topics in the Science of Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3384217.3386400","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The ever-changing digital landscape remains more vulnerable than ever with cybersecurity becoming increasingly important to the success of the digital economy and its stakeholders. With models including cloud computing, mobility and IoT systems, understanding how tools and methodologies for security testing have evolved is an important task. In particular, more sophisticated approaches to vulnerability assessment are currently used and necessary to address more complex security vulnerabilities. One of the central tools used in vulnerability testing is penetration testing, along with other techniques that are more broadly classified as ethical hacking. This study addresses the following research questions. (1) What are the current research trends including, current terminology and concepts, used in ethical hacking? (2) What are current challenges and best practices in ethical hacking? (3) In our multiple case-study, how do these findings relate to each case of our three industry case studies in ethical hacking? We began by conducting a systematic review of 112 articles of peer-reviewed journals, conference proceedings and edited books from the time period of 2012-2019 to address these questions. We ranked the techniques presented in the 42 papers, a subset of the original set, based on theoretical merits, transparency of information and additional strict inclusion/exclusion criteria. Next, we provide an analysis of current research in the field including application scenarios, models, methodologies and tools. This included the completion of a literature review that includes a conceptual analysis of current terminology used in ethical hacking, both in research and in practice. We then summarize our analysis, findings and suggestions for improvements in conceptual frameworks for research in this area. Lastly, we used our resulting conceptual framework in a multi-case study approach to three ethical hacking cases for three industry participants. These results include details of the ethical hacking process in each case. In concluding our study, we argue that current frameworks for research are limited in scope and unable to address the complexity of ethical hacking within complex cybersecurity ecosystems. The result of the literature review and multiple-case study research is an improved framework for research that encompasses a multitude of factors and attributes of major attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.
伦理黑客的方法:扩展研究的概念框架
不断变化的数字环境比以往任何时候都更加脆弱,网络安全对数字经济及其利益相关者的成功变得越来越重要。对于包括云计算、移动和物联网系统在内的模型,了解安全测试的工具和方法是如何演变的是一项重要任务。特别是,目前正在使用更复杂的漏洞评估方法,并且需要解决更复杂的安全漏洞。漏洞测试中使用的核心工具之一是渗透测试,以及其他更广泛地归类为道德黑客的技术。本研究解决了以下研究问题。(1)当前的研究趋势是什么,包括当前的术语和概念,用于道德黑客?(2)当前道德黑客的挑战和最佳实践是什么?(3)在我们的多个案例研究中,这些发现如何与我们在道德黑客方面的三个行业案例研究中的每个案例相关联?我们首先对2012-2019年期间同行评议期刊、会议记录和编辑书籍的112篇文章进行了系统综述,以解决这些问题。我们根据理论优点、信息透明度和附加的严格纳入/排除标准,对42篇论文(原始集合的一个子集)中提出的技术进行了排名。接下来,我们对该领域的当前研究进行了分析,包括应用场景、模型、方法和工具。这包括完成一篇文献综述,其中包括对研究和实践中使用的道德黑客当前术语的概念分析。然后,我们总结了我们的分析、发现和改进这一领域研究的概念框架的建议。最后,我们将所得的概念框架用于三个行业参与者的三个道德黑客案例的多案例研究方法。这些结果包括每个案例中道德黑客过程的细节。在总结我们的研究时,我们认为目前的研究框架范围有限,无法解决复杂网络安全生态系统中道德黑客的复杂性。文献综述和多案例研究的结果是一个改进的研究框架,它包含了威胁计算机安全的主要攻击的众多因素和属性;一个包含网络安全生态系统复杂性的更强大、更综合的多层框架。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信