{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T22:52:24Z","timestamp":1776207144532,"version":"3.50.1"},"reference-count":36,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,4,9]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network security vulnerabilities in the industry, with dozens of incidents, which were promptly dealt with and rectified, effectively improving the level of network security management and protection in the industry. As networks are very much vulnerable to denial of service attacks, much more emphasis has been given to security. By improving their network security, network administrators have often tried their best. To attempt penetration testing, it is the best way of ensuring the system security. With the development of information technology, the security requirement of information system is increasing day by day. The use of penetration testing technology is conducive to the realization of accurate positioning, accurate detection, and active alarm of security vulnerabilities, and the optimization of monitoring and rectification of the combination of network security management control system. Taking penetration testing technology as one of the core elements of management and control, the risk index model is optimized to make network security management controllable and efficient, and effectively achieve management and control objectives.<\/jats:p>","DOI":"10.1515\/jisys-2020-0145","type":"journal-article","created":{"date-parts":[[2021,5,12]],"date-time":"2021-05-12T04:06:38Z","timestamp":1620792398000},"page":"592-603","source":"Crossref","is-referenced-by-count":8,"title":["An empirical study on vulnerability assessment and penetration detection for highly sensitive networks"],"prefix":"10.1515","volume":"30","author":[{"given":"Liwei","family":"Wang","sequence":"first","affiliation":[{"name":"State Grid Hebei Electric Power Co., Ltd., Information and Communication Branch , Shijiazhuang , Hebei Province, 050000 , China"}]},{"given":"Robert","family":"Abbas","sequence":"additional","affiliation":[{"name":"School of Engineering, Macquarie University , Macquarie Park , NSW 2113 , Australia"}]},{"given":"Fahad M.","family":"Almansour","sequence":"additional","affiliation":[{"name":"Depertment of Computer Science, College of Sciences and Arts in Rass, Qassim University , Buraydah 51452 , Saudi Arabia"}]},{"given":"Gurjot Singh","family":"Gaba","sequence":"additional","affiliation":[{"name":"School of Electronics and Electrical Engineering, Lovely Professional University , Phagwara 144411 , India"}]},{"given":"Roobaea","family":"Alroobaea","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computers and Information Technology, Taif University , Taif , KSA"}]},{"given":"Mehedi","family":"Masud","sequence":"additional","affiliation":[{"name":"Department of Computer Science, College of Computers and Information Technology, Taif University , Taif , KSA"}]}],"member":"374","published-online":{"date-parts":[[2021,4,9]]},"reference":[{"key":"2025120523322292930_j_jisys-2020-0145_ref_001","unstructured":"Xiao-Xia W. Research on information security architecture of computer network. Digital Technol Appl. 2018;36(12):181\u20132."},{"key":"2025120523322292930_j_jisys-2020-0145_ref_002","unstructured":"Dongying L, Baohai Y. Research on information security strategy based on wireless network access. Digital Technol Appl. 2018;36(11):191\u20132."},{"key":"2025120523322292930_j_jisys-2020-0145_ref_003","unstructured":"Wu YX, Wang HF. Computer network information security risks and protective measures against the background of big data. J Luohe Vocat Tech Coll. 2019;4:20\u20132."},{"key":"2025120523322292930_j_jisys-2020-0145_ref_004","doi-asserted-by":"crossref","unstructured":"B\u00f6hme R, F\u00e9legyh\u00e1zi M. Optimal information security investment with penetration testing. International conference on decision and game theory for security. Berlin, Heidelberg: Springer; 2010, November. p. 21\u201337.","DOI":"10.1007\/978-3-642-17197-0_2"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_005","doi-asserted-by":"crossref","unstructured":"Louvieris P, Clewley N, Liu X. Effects-based feature identification for network intrusion detection. Neurocomputing. 2013;121:265\u201373.","DOI":"10.1016\/j.neucom.2013.04.038"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_006","doi-asserted-by":"crossref","unstructured":"Alosaimi W, Zak M, Al-Begain K, Alroobaea R, Masud M. Economic denial of sustainability attacks mitigation in the cloud. Int J Commun Netw Inf Security. 2017;9(3):420\u20134314.","DOI":"10.17762\/ijcnis.v9i3.2798"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_007","doi-asserted-by":"crossref","unstructured":"Qiu Z, Piyawattanametha W. MEMS based fiber optical microendoscopes. Displays. 2015;37:41\u201353.","DOI":"10.1016\/j.displa.2014.12.001"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_008","unstructured":"SECURITIES PHOV. Management information circular; 2014."},{"key":"2025120523322292930_j_jisys-2020-0145_ref_009","doi-asserted-by":"crossref","unstructured":"Bacudio AG, Yuan X, Chu BTB, Jones M. An overview of penetration testing. Int J Netw Secur Appl. 2011;3(6):19.","DOI":"10.5121\/ijnsa.2011.3602"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_010","doi-asserted-by":"crossref","unstructured":"Thompson HH. Application penetration testing. IEEE Secur Priv. 2005;3(1):66\u20139.","DOI":"10.1109\/MSP.2005.3"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_011","doi-asserted-by":"crossref","unstructured":"Alosaimi W, Zak M, Al-Begain K, Alroobaea R, Masud M. Mitigation of distributed denial of service attacks in the cloud. Cybern Inf Technol. 2017;17(14):32\u20135.","DOI":"10.1515\/cait-2017-0040"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_012","doi-asserted-by":"crossref","unstructured":"Yeo J. Using penetration testing to enhance your company\u2019s security. Comput Fraud Secur. 2013;2013(4):17\u201320.","DOI":"10.1016\/S1361-3723(13)70039-3"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_013","unstructured":"Ma WM. Research on website penetration test. Glob Bus Manag J. 2019;11:121\u201332."},{"key":"2025120523322292930_j_jisys-2020-0145_ref_014","doi-asserted-by":"crossref","unstructured":"Diro A, Chilamkurti N. Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun Mag. 2018;56(9):124\u201330.","DOI":"10.1109\/MCOM.2018.1701270"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_015","doi-asserted-by":"crossref","unstructured":"Qing L, Boyu Z, Jinhua W, Qinqian L. Research on key technology of network security situation awareness of private cloud in enterprises. In 2018 IEEE 3rd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA). IEEE; 2018. pp. 462\u20136.","DOI":"10.1109\/ICCCBDA.2018.8386560"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_016","doi-asserted-by":"crossref","unstructured":"Nagarajan A, Varadharajan V, Tarr N. Trust enhanced distributed authorisation for web services. J Comput Syst Sci. 2014;80(5):916\u201334.","DOI":"10.1016\/j.jcss.2014.02.002"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_017","doi-asserted-by":"crossref","unstructured":"Bailey C, Chadwick DW, de Lemos R. Self-adaptive federated authorization infrastructures. J Comput Syst Sci. 2014;80(5):935\u201352.","DOI":"10.1016\/j.jcss.2014.02.003"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_018","doi-asserted-by":"crossref","unstructured":"Bailey C. Application of self-adaptive techniques to federated authorization models. 2012 34th international conference on software engineering (ICSE). IEEE; 2012, June. p. 1495\u20138.","DOI":"10.1109\/ICSE.2012.6227053"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_019","doi-asserted-by":"crossref","unstructured":"Budiarto R, Ramadass S, Samsudin A, Noor S. Development of penetration testing model for increasing network security. Proceedings 2004 international conference on information and communication technologies: from theory to applications, 2004. IEEE; 2004, April. p. 563\u20134.","DOI":"10.1109\/ICTTA.2004.1307886"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_020","doi-asserted-by":"crossref","unstructured":"Shanmugapriya R. A study of network security using penetration testing. 2013 international conference on information communication and embedded systems (ICICES). IEEE; 2013, February. p. 371\u20134.","DOI":"10.1109\/ICICES.2013.6508375"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_021","doi-asserted-by":"crossref","unstructured":"Zhou D. Research on the security strategy and technology of information resource network of chinese academy library. J Phys Conf Ser. 2020;1550:032037.","DOI":"10.1088\/1742-6596\/1550\/3\/032037"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_022","unstructured":"Duan T, Xiang J, Zhang H, Li Q-M. Research on simulation method of industrial control system attack based on hybrid test. Cyber Secur. 2019;3:8\u201322."},{"key":"2025120523322292930_j_jisys-2020-0145_ref_023","doi-asserted-by":"crossref","unstructured":"Zhou D. Research on the security strategy and technology of information resource network of chinese academy library. J Phys Conf Ser. 2020;1550:032037.","DOI":"10.1088\/1742-6596\/1550\/3\/032037"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_024","doi-asserted-by":"crossref","unstructured":"Kumar D, Sharma A, Kumar R, Sharma N. Restoration of the network for next generation (5G) optical communication network. In 2019 International Conference on Signal Processing and Communication (ICSC). IEEE; 2019. pp. 64\u20138.","DOI":"10.1109\/ICSC45622.2019.8938337"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_025","doi-asserted-by":"crossref","unstructured":"Sharma A. Optical sensors in environmental applications. Environmental and process monitoring technologies. Vol. 1637. International Society for Optics and Photonics; 1992, May. p. 270\u20139.","DOI":"10.1117\/12.59345"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_026","doi-asserted-by":"crossref","unstructured":"Rathee G, Sharma A, Kumar R, Ahmad F, Iqbal R. A trust management scheme to secure mobile information centric networks. Comput Commun. 2020;151:66\u201375.","DOI":"10.1016\/j.comcom.2019.12.024"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_027","doi-asserted-by":"crossref","unstructured":"Zhan W, Tao Z. Research on 5G mobile communication network security technology. J Phys Conf Ser. 2020;1634(1):012055 (7pp).","DOI":"10.1088\/1742-6596\/1634\/1\/012055"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_028","doi-asserted-by":"crossref","unstructured":"Mehedi M, Shamim H. Secure data-exchange protocol in a cloud-based collaborative health care environment. Multimed Tools Appl. 2020;77(9):11121\u201335.","DOI":"10.1007\/s11042-017-5294-5"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_029","unstructured":"Sharma A, Kumar R. A framework for pre-computated multi-constrained quickest qos path algorithm. J Telecommun Electron Computer Eng (JTEC). 2017;9(3\u20136):73\u20137."},{"key":"2025120523322292930_j_jisys-2020-0145_ref_030","doi-asserted-by":"crossref","unstructured":"Sharma A, Ansari MD, Kumar R. A comparative study of edge detectors in digital image processing. In 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC). IEEE; 2017. pp. 246\u201350.","DOI":"10.1109\/ISPCC.2017.8269683"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_031","doi-asserted-by":"crossref","unstructured":"Kumar R, Kumar P. Special issue on recent trends in artificial intelligence techniques for fault-tolerance, reliability and availability in mission-critical networks. Recent Adv Comput Sci Commun (Formerly: Recent Pat Comput Sci). 2020;13(3):311\u20132.","DOI":"10.2174\/266625581303200609105423"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_032","doi-asserted-by":"crossref","unstructured":"Passarella A. A survey on content-centric technologies for the current Internet: CDN and P2P solutions. Comput Commun. 2012;35(1):1\u201332.","DOI":"10.1016\/j.comcom.2011.10.005"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_033","doi-asserted-by":"crossref","unstructured":"Dogra J, Jain S, Sharma A, Kumar R, Sood M. Brain tumor detection from MR images employing fuzzy graph cut technique. Recent Adv Comput Sci Commun (Formerly: Recent Pat Comput Sci). 2020;13(3):362\u20139.","DOI":"10.2174\/2213275912666181207152633"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_034","doi-asserted-by":"crossref","unstructured":"Huang HC, Zhang ZK, Cheng HW, Shieh SW. Web application security: threats, countermeasures, and pitfalls. Computer. 2017;50(6):81\u20135.","DOI":"10.1109\/MC.2017.183"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_035","doi-asserted-by":"crossref","unstructured":"Khan R, Kumar P, Jayakody DNK, Liyanage M. A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions. IEEE Commun Surv Tutor. 2019;22(1):196\u2013248.","DOI":"10.1109\/COMST.2019.2933899"},{"key":"2025120523322292930_j_jisys-2020-0145_ref_036","doi-asserted-by":"crossref","unstructured":"Borrion H, Amiri A, Delpech D, Lemieux AM. Experimental assessment of the viability of using ground penetrating radar for metal wire-snare detection. Crime Sci. 2019;8(1):1\u201310.","DOI":"10.1186\/s40163-019-0105-0"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2020-0145\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2020-0145\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:34:10Z","timestamp":1764977650000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2020-0145\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,9,22]]},"published-print":{"date-parts":[[2021,9,22]]}},"alternative-id":["10.1515\/jisys-2020-0145"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2020-0145","relation":{},"ISSN":["2191-026X"],"issn-type":[{"value":"2191-026X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}