Research on Network Protocol Vulnerability Discovery Based on Fuzz Testing

被引:0
|
作者
Li, Mingxuan [1 ]
He, Ling [1 ]
Teng, YangXin [1 ]
Wang, Xu [1 ]
Zhang, Jianye [2 ]
Qing, Song [2 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Informat & Commun Technol Ctr, Urumqi, Peoples R China
[2] State Grid Xinjiang Elect Power Co, Urumqi, Peoples R China
关键词
network protocol vulnerability discovery; fuzz testing; heuristic test case generation; Peach;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the network application programs are developed rapidly, and the requirement of network protocol security is continually improved, the fuzz testing has become the research hotspot. On the basis of summarizing the current research direction, the identification method and test case generation of network protocol are researched emphatically. The heuristic fuzz testing framework based on parameter weight is proposed according to heuristic search algorithm and probability weights. The existing fuzz testing and vulnerability mining tool Peach is selected for extension, in which the heuristic input tracking technology based on parameter weight is adopted by the data generation module; IDAPRO is used to extract the function's heuristic factor to form the heuristic rules, and then the heuristic rules are used to guide the test case generation process; the transmission order of test cases is determined based on parameter weight. Finally, the commonly-used FTP protocol was verified with development tools. The test results verify that the heuristic fuzz testing framework based on parameter weight achieved the expected effect.
引用
收藏
页码:1354 / 1358
页数:5
相关论文
共 50 条
  • [31] Fuzz Testing in Behavior-Based Robotics
    Delgado, Rodrigo
    Campusano, Miguel
    Bergel, Alexandre
    2021 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS AND AUTOMATION (ICRA 2021), 2021, : 9375 - 9381
  • [32] An Automatic Fuzz Testing Method Designed for Detecting Vulnerabilities on All Protocol
    Huang, Bo
    Wen, Qiaoyan
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 639 - 642
  • [33] RankFuzz: Fuzz Testing Based on Comprehensive Evaluation
    Li, Cheng
    Wei, Qiang
    Wang, Qingxian
    2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 939 - 942
  • [34] Toward Fuzz Test Based on Protocol Reverse Engineering
    Cai, Jun
    Luo, Jian-Zhen
    Ruan, Jianliang
    Liu, Yan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 892 - 897
  • [35] Research and Application of Heterogeneous Network Topology Discovery Algorithm Based on Multiple Spanning Tree Protocol
    Li, Dancheng
    Zheng, Chen
    Han, Chunyan
    Liu, Yixian
    KNOWLEDGE DISCOVERY AND DATA MINING, 2012, 135 : 437 - 444
  • [36] DEFT: A Novel Deep Framework for Fuzz Testing Performance Evaluation in NextG Vulnerability Detection
    Peng, Yifeng
    Li, Xinyi
    Arya, Sudhanshu
    Wang, Ying
    IEEE ACCESS, 2023, 11 : 116046 - 116064
  • [37] Research on Discovery Protocol of LXI Instruments Based on ZeroConf
    Geng, Jianping
    Yao, Ying
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 1, 2011, : 276 - 279
  • [38] Automatic testing of neighbor discovery protocol based on FSM and TTCN
    Wang, ZL
    Yin, X
    Wang, HB
    Wu, JP
    2004 JOINT CONFERENCE OF THE 10TH ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS AND THE 5TH INTERNATIONAL SYMPOSIUM ON MULTI-DIMENSIONAL MOBILE COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 805 - 809
  • [39] Deep Learning-based Hybrid Fuzz Testing
    Gao F.-J.
    Wang Y.
    Situ L.-Y.
    Wang L.-Z.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (04): : 988 - 1005
  • [40] Detecting communication protocol security flaws by formal fuzz testing and machine learning
    Shu, Guoqiang
    Hsu, Yating
    Lee, David
    FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2008, 2008, 5048 : 299 - 304