Research on Network Protocol Vulnerability Discovery Based on Fuzz Testing

被引:0
|
作者
Li, Mingxuan [1 ]
He, Ling [1 ]
Teng, YangXin [1 ]
Wang, Xu [1 ]
Zhang, Jianye [2 ]
Qing, Song [2 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Informat & Commun Technol Ctr, Urumqi, Peoples R China
[2] State Grid Xinjiang Elect Power Co, Urumqi, Peoples R China
关键词
network protocol vulnerability discovery; fuzz testing; heuristic test case generation; Peach;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the network application programs are developed rapidly, and the requirement of network protocol security is continually improved, the fuzz testing has become the research hotspot. On the basis of summarizing the current research direction, the identification method and test case generation of network protocol are researched emphatically. The heuristic fuzz testing framework based on parameter weight is proposed according to heuristic search algorithm and probability weights. The existing fuzz testing and vulnerability mining tool Peach is selected for extension, in which the heuristic input tracking technology based on parameter weight is adopted by the data generation module; IDAPRO is used to extract the function's heuristic factor to form the heuristic rules, and then the heuristic rules are used to guide the test case generation process; the transmission order of test cases is determined based on parameter weight. Finally, the commonly-used FTP protocol was verified with development tools. The test results verify that the heuristic fuzz testing framework based on parameter weight achieved the expected effect.
引用
收藏
页码:1354 / 1358
页数:5
相关论文
共 50 条
  • [1] A Mutation-based Fuzz Testing Approach for Network Protocol Vulnerability Detection
    Han, Xing
    Wen, Qiaoyan
    Zhang, Zhao
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1018 - 1022
  • [2] Vulnerability mining method for industrial control network protocol based on fuzz testing
    Lai Y.
    Yang K.
    Liu J.
    Liu Z.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2265 - 2279
  • [3] Network protocol vulnerability discovery based on fuzzy testing
    Zhang, Baofeng
    Zhang, Chongbin
    Xu, Yuan
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2113 - 2118
  • [4] Network Protocol Security Testing Based on Fuzz
    Li Haifeng
    Wang Shaolei
    Zhang Bin
    Shuai Bo
    Tang Chaojing
    PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 955 - 958
  • [5] Research on the model of vulnerability mining based on the local fuzz
    Qiu Bing-Xue
    Li Yi-Chao
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [6] Wi-fi protocol vulnerability discovery based on fuzzy testing
    Zhu, K. (zwkh100@163.com), 1600, Universitas Ahmad Dahlan, Jalan Kapas 9, Semaki, Umbul Harjo,, Yogiakarta, 55165, Indonesia (11):
  • [7] Network protocol fuzz testing for information systems and applications: a survey and taxonomy
    Munea, Tewodros Legesse
    Lim, Hyunwoo
    Shon, Taeshik
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) : 14745 - 14757
  • [8] Network protocol fuzz testing for information systems and applications: a survey and taxonomy
    Tewodros Legesse Munea
    Hyunwoo Lim
    Taeshik Shon
    Multimedia Tools and Applications, 2016, 75 : 14745 - 14757
  • [9] Improve Peach: Making Network Protocol Fuzz Testing More Precisely
    Zhang, Hua
    Zhang, Zhao
    Tang, Wen
    DESIGN, MANUFACTURING AND MECHATRONICS, 2014, 551 : 642 - 647
  • [10] A Novel Protocol Fuzz Testing Approach
    Li Haifeng
    Shuai Bo
    Wang Jian
    Tang Chaojing
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1067 - 1072