Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
Systematic Review Automation in Cyber Security
Volume 5 Issue 4, May-June 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
KEYWORDS: Pentesting, Automation, Cyber chain, Vulnerabilities, 0day Copyright © 2021 by author(s) and
International Journal of Trend in Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
@ IJTSRD | Unique Paper ID – IJTSRD41315 | Volume – 5 | Issue – 4 | May-June 2021 Page 388
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
assets, services and be on the same level as service provider any project is under high prioritization of security
in testing skill to check integrity of services the third party is precautions, and this can be achieved with greater
offering, it might be a software irrespective of platform, experience in specified operation development as well as in
network, common interface platforms for both employees as development model like Water Fall model, Iterative model,
well customers. Mainly the internal team handles the day to Spiral model, Agile model etc. The complexity resides on the
day tasks like SOC, NOC etc. And these operations cannot network level, the complexity is must and it should be
easily be handover to third party due to cost matter and completely comprehensible to internal team, like virtual sub-
confidential operations period[1][9][10]. The first responder networks, and their behaviour with preset of ACL(Access
of any internal cause of threat would be internal VAPT team. Control List). And this all depends on the network
The internal assets pentesting operations may get easier if architecture efficiency, impact isolation strategy
the development practices throughout the deployment of implementation in software and hardware parts[3].
Fig 1.1 Generic Testing and Model Training Life Cycle Flow Chart
The necessity of internal pentesting to protect the internal data flow and privileged systems, and the intra-network is the one
that challenges the attacker, how far the attack can be carried out. If the impact on the hosted services is leading and effecting
to internal operation and architecture, that means the organization intra-network is not robust in nature. Sometimes the attack
would not necessarily be initiated from outside the network, the organizational employee could use it for sabotaging the
organization. The nodes under the intra-network has to be secured, before any attacker makes use of existing vulnerabilities on
the nodes. It is also important to know how well the prevention systems works at worst situation like cyber attacks.
Pentesting Externally hosted services: This is the public exposed assets, that needs more attention with constant support, in
short maintaining the consistency of any hosted services can reduce the impact and future loss. The services could be
standalone software, internet services like web applications, mobile applications, IoT devices, hardware equipments or
subscription based services etc. Every single services has a separate set of standards for pentesting methodologies and
frameworks.
For web application pentesting standard methodology could be initial reconnaissance and OSINT(Open source Intelligence
Gathering), threat modelling, vulnerability analysis, initial exploitation, post exploitation, and finally vulnerability assessment,
report writing and auditing[4]. The methodology completely depends on the team or organization specific, and can design their
own frameworks for set of service’s pentesting. IoT pentesing general methodology includes isolation testing technique, later
begins with communication protocols usage and testing its consistency, testing environmental interaction with other connected
components to complete the task, testing its functionality using bottom-up or top to bottom approach, its hardware and
firmware reconnaissance and testing, centralized management device or system testing[5]. The hardware equipment
pentesting methodology is almost same as IoT device testing but with wider scope. The tools that are used throughout the
process is completely depends on the organization choice, hired third party standard methodological based tools.
Generic Methodology And Existing System’s Workflow
The workflow represents complete procedure that needs to fulfill all the pentesting and specific organization requirements.
First the internal team is the only source for complete pentesting operations, secondly hiring a third party penetration testing
team as a service. The higher authority and defined standards for SDLC inside the organization highly depends on the
penetration testing plans with proper budget like when and how. The pentesting operation could take place on every month at
lower scope, quarterly or yearly. The how defines the techniques, methodologies and standard frameworks and this lead to
choosing an efficient tool matching the preset of criteria[6].
@ IJTSRD | Unique Paper ID – IJTSRD41315 | Volume – 5 | Issue – 4 | May-June 2021 Page 389
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD41315 | Volume – 5 | Issue – 4 | May-June 2021 Page 390
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
Report Generating: Almost all the open source and paid discoveries. Automated testing tool’s main scope should be
automation tools generate a complete scanning, fetched discovery the 0day loop holes.
information, discovered vulnerabilities and their severity
Reference
level, impact area and final recommended fixes after test in
[1] A. V. Erisa Karafili, "Automatic Firewalls’
reusable format as well as for report documentation.
Configuration Using Argumentation Reasoning,
In defensive approach, more than half of the tasks are "Springer, Cham, p. 15, 2020.
carried out by the automation systems or software; network
[2] J. Hoffmann, "Simulated Penetration Testing: From
and security operation centre. The system looks for
“Dijkstra” To “Turing Test++”,"ICAPS, p. 25, Apr 2015.
malicious patterns in data and control flow based on pattern
matching algorithm[10][11], system even tries to prevent it [3] G. S. J. H. M. S. Dorin Shmaryahu, "Simulated
from completing the task but with all under human Penetration Testing As Contingent Planning," ICAPS,
supervision. The pattern matching system generates alert on p. 28, Jun 2018.
the basis of percentage of impact is going make on any part
[4] F. U. R. J. A. D. M. R. Insha Altaf, "Vulnerability
of asset in the organization. The alert contains detail report
Assessment And Patching Management,
on specific application behaviour on which the pattern
"International Conference On Soft Computing
recognized, severity level, description of the attack or
Techniques And Implementations (ICSCTI -IEEE), p. 5,
malicious task, all resources utilization and some level of
Oct 2015.
recommendation to mitigate the continuation of the
malicious task. [5] J. A. R. K. Archibald, "Refining The Pointer “Human
Firewall” Pentesting Framework," Emerald Publishing
Conclusion and Future Scope
Limited, p. 27, Sept 2019.
There’s no control on restricting the growing technology and
number of devices on the internet, billions of devices gets [6] N. Samant, "Automated Penetration Testing," San Jose
added to internet every year. Developers, manufacturers and State University, 2011.
service owners does not perform proper testing phase, this
[7] Stefan Niculae, Daniel Dichiu, Kaifeng Yang, Thomas
leading to creating new continuous maintenance
Back, "Automating Penetration Testing Using
department. The application, service or software system gets
Reinforcement Learning.," Experimental Research
encountered on unsettled or completely new environment,
Unit Bitdefender & Natural Computing Group, Leiden
this causes new issues on the overall application behaviour,
Institute Of Advanced Computer Science., p. 13, 2015-
finally leading to organizational loss or losing user trust. The
2020.
automated testing and monitoring tools work to mitigate any
future impact before any attacker discovers and leverages [8] A. L. S. O. L. J. G. V. Esteban Alejandro Armas Vega,
the vulnerability. It is important to maintain the tool "Benchmarking Of Pentesting Tools," International
consistency and reliability on highest priority. Mainly the Journal Of Computer And Information Engineering, p.
algorithms in dynamic testing systems should get improved 4, 2017.
on accuracy, resource consumption should be decreased
leading to less load on performance and get faster result on [9] Matt Willems , "What Soc Automation Tools Can Do
every test. This can be achieved by properly testing the For Your Team," 28 Sep 2020. [Online]. Available:
overall performance at different environment and dataset Https://Logrhythm.Com/Blog/What-Automation-
before making it public. Can-Do-For-Your-Soc/.
Automated testing systems should mainly focus on other [10] P. N. Martti Lehto, Cyber Security: Analytics,
technology integration and working with different datasets. Technology and Automation, Springer, Cham, 2015.
Systems efficiency is measured by improvements in its [11] M. S. V. K. B. Vibha Gupta, "Analysis Of Pattern
performance. This can be achieved by leveraging the neural Matching Algorithms In Network Intrusion Detection
network and deep learning algorithms with proper module Systems," International Conference On Advances In
implementation, and focusing and feeding manual pentesting Computing, Communication, & Automation (Icacca) -
methodology to the system. More accurate algorithms IEEE, p. 5, Oct 2016.
decreases the false positive alerts and vulnerability
@ IJTSRD | Unique Paper ID – IJTSRD41315 | Volume – 5 | Issue – 4 | May-June 2021 Page 391