• 基于服务器主动安全的自动化红队测试技术研究

    Research on automated red teaming technique based on server active security

    • 高级持续性威胁(Advanced Persistent Threat, APT)对政府机构、企业及其他组织的网络安全和隐私构成了严重威胁。在现有的红队测试中,缺乏明确的攻击行为顺序指导,导致潜在网络威胁的推理和验证效率低下。为解决这一问题,提出了一种基于偏序规划的攻击图构建方法。这种方法能够快速、准确且有序地预测潜在的威胁路径。此外,现有的威胁评估指标主要集中于通用威胁评估,忽视了实际网络环境中威胁利用的难度。针对这一问题,提出了一种结合CVSS和代理深度的风险评估模型,以更全面地衡量风险。设计了一款基于攻击图的自动化渗透测试工具,能够实现基于攻击路径的自主信息收集、渗透测试和后渗透测试的全流程自动化。通过在多个网络环境中的验证,结果表明:所提方法能够有效推理攻击序列并针对攻击路径可行性实现高效精准评估,最终指导自动化渗透攻击实现可行性验证。

       

      Abstract: Advanced Persistent Threat (APT) pose serious risks to the network security and privacy of government agencies, businesses, and other organizations. In current red team testing, there is a lack of clear guidance on the sequence of attack actions. This leads to low efficiency in threat reasoning and verification. To address this issue, this paper introduces an attack graph construction method based on partial order planning. This method can quickly, accurately, and orderly predict potential threat paths. Additionally, existing threat assessment metrics mainly focus on general threat evaluations. They often overlook the difficulty of exploiting threats in real network environments. To overcome this, we propose a risk assessment model that combines CVSS with agent depth. This approach provides a more comprehensive measurement of risk by considering both vulnerability severity and the complexity of exploitation in specific network settings. Finally, we designed an automated penetration testing tool based on attack graphs. This tool can autonomously collect information, perform penetration testing, and conduct post-penetration activities based on attack paths, achieving full-process automation. Validation in multiple network environments shows that our proposed methods can effectively infer attack sequences and efficiently evaluate the feasibility of attack paths. This ultimately enables the successful verification of automated penetration attacks, enhancing overall network security.

       

    /

    返回文章
    返回