Virtual penetration testing with phase based vulnerability analysis

Çalışkan, Emre
Vulnerability scanning, penetration testing, and manual auditing are ways of finding vulnerabilities in organizations. However, they have some limitations like time, accuracy, testers’ ability, etc. Virtual penetration testing aims to alleviate these limitations. By virtual penetration testing, it is intended to assess security controls corresponding to the vulnerabilities found by vulnerability scanning, and correlating assessment result with vulnerabilities. Consequently, correlation will enable to find exploitable vulnerabilities and to make a reliable prioritization between the vulnerabilities. Since security control assessments are done in compliance with the cyber-attack phases, obtained results provide opportunity to create possible attack paths. In order to realize virtual penetration testing, a generic cyber-attack model is proposed and an experiment lab is established. In the experiment, security controls, corresponding to the attack phases, are tested. As a result of experiment, it is observed that, limitations of vulnerability scanning and penetration testing can reduced by using virtual penetration testing.


A faster intrusion detection method for high-speed computer networks
Tarım, Mehmet Cem; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2011)
The malicious intrusions to computer systems result in the loss of money, time and hidden information which require deployment of intrusion detection systems. Existing intrusion detection methods analyze packet payload to search for certain strings and to match them with a rule database which takes a long time in large size packets. Because of buffer limits, packets may be dropped or the system may stop working due to high CPU load. In this thesis, we investigate signature based intrusion detection with sig...
Creating application security layer based on resource access decision service
Metin, Mehmet Özer; Şener, Cevat; Department of Computer Engineering (2007)
Different solutions have been used for each security aspects (access control, application security) to secure enterprise web applications. However combining "enterprise-level" and "application-level" security aspects in one layer could give great benefits such as reusability, manageability, and scalability. In this thesis, adding a new layer to n-tier web application architectures to provide a common evaluation and enforcement environment for both enterprise-level and application level policies to bring tog...
Specification and verification of confidentiality in software architectures
Ulu, Cemil; Oğuztüzün, Mehmet Halit S.; Department of Computer Engineering (2004)
This dissertation addresses the confidentiality aspect of the information security problem from the viewpoint of the software architecture. It presents a new approach to secure system design in which the desired security properties, in particular, confidentiality, of the system are proven to hold at the architectural level. The architecture description language Wright is extended so that confidentiality authorizations can be specified. An architectural description in Wright/c, the extended language, assigns...
An assessment and analysis tool for statistical process control of software process
Kırbaş, Serkan; Doğru, Ali Hikmet; Department of Computer Engineering (2007)
Statistical process control (SPC) which includes very powerful techniques used in other mature engineering disciplines for providing process control is not used by many software organizations. In software engineering domain, SPC is currently utilized only by organizations which have high maturity levels according to the process improvement models like CMM, ISO/IEC 15504 and CMMI. Guidelines and software tools to implement SPC techniques should be developed for effective use and dissemination of SPC especial...
Architectural design of an access control system for enterprise networks
Kirimer, Burak; Özgit, Attila (2007-11-09)
Client computers in enterprise networks have the potential to be the source of serious security problems, especially when their hardware and software components are out of physical administrative control. Besides, services in the network may have client configuration requirements. We propose a system composed of a policy management and enforcement server and client agents, which authenticates the client users and checks their computer configurations before allowing their access to services. The information ...
Citation Formats
E. Çalışkan, “Virtual penetration testing with phase based vulnerability analysis,” M.S. - Master of Science, Middle East Technical University, 2015.