Research Article
DQfD-AIPT: An Intelligent Penetration Testing Framework Incorporating Expert Demonstration Data
Table 3
Firewall policies for the enterprise network.
| Sources | Destination | Service | Rule |
| SpringBoot | Windows7 | HTTPS, RDP | Permit | SpringBoot | Tomcat | HTTP, SSH | Permit | SpringBoot | Log4j | HTTPS, RDP | Permit | SpringBoot | Honeypot-1 | | All permit | SpringBoot | Trust-2 | | All deny | Trust-1 | Trust-2 | HTTPS, MySQL, FTP, HTTP, SSH | Permit | Trust-1 | DMZ | | All permit | Trust-2 | Windows7 | HTTPS, RDP | Permit | Trust-2 | Tomcat | HTTP, SSH | Permit | Trust-2 | Log4j | HTTPS, RDP | Permit | Trust-2 | Honeypot-1 | | All permit |
|
|