z-logo
open-access-imgOpen Access
Research on Technologies of Vulnerability Mining and Penetration Testing for Satellite Communication Network
Author(s) -
Kun Dong,
Haixia Zhang,
Yanmei Liu,
Yang Li,
Yuanyuan Peng
Publication year - 2021
Publication title -
iop conference series. earth and environmental science
Language(s) - English
Resource type - Journals
eISSN - 1755-1307
pISSN - 1755-1315
DOI - 10.1088/1755-1315/693/1/012112
Subject(s) - computer science , vulnerability management , vulnerability (computing) , fuzz testing , network security , vulnerability assessment , computer security , communications satellite , buffer overflow , communications security , trojan horse , computer network , software , satellite , engineering , encryption , operating system , psychology , psychological resilience , psychotherapist , aerospace engineering
According to the specific characteristics of software, hardware and network protocols, the cyber security problems of satellite communication network have gradually attracted the attention of the industry in recent years. This paper proposes a technical framework including information collection and detection, vulnerability mining and penetration testing. It introduces mining methods such as taint analysis, symbol execution and fuzzy testing, and combines with machine learning algorithms to improve the efficiency and accuracy of vulnerability mining. It uses buffer overflow, SQL injection, cross-site attack and Trojan horse penetration to test the security of satellite communication network. It is helpful to improve the ability of proactive defense and security guarantee of satellite communication network.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here