Research on Network Protocol Vulnerability Discovery Based on Fuzz Testing

被引:0
|
作者
Li, Mingxuan [1 ]
He, Ling [1 ]
Teng, YangXin [1 ]
Wang, Xu [1 ]
Zhang, Jianye [2 ]
Qing, Song [2 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Informat & Commun Technol Ctr, Urumqi, Peoples R China
[2] State Grid Xinjiang Elect Power Co, Urumqi, Peoples R China
关键词
network protocol vulnerability discovery; fuzz testing; heuristic test case generation; Peach;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the network application programs are developed rapidly, and the requirement of network protocol security is continually improved, the fuzz testing has become the research hotspot. On the basis of summarizing the current research direction, the identification method and test case generation of network protocol are researched emphatically. The heuristic fuzz testing framework based on parameter weight is proposed according to heuristic search algorithm and probability weights. The existing fuzz testing and vulnerability mining tool Peach is selected for extension, in which the heuristic input tracking technology based on parameter weight is adopted by the data generation module; IDAPRO is used to extract the function's heuristic factor to form the heuristic rules, and then the heuristic rules are used to guide the test case generation process; the transmission order of test cases is determined based on parameter weight. Finally, the commonly-used FTP protocol was verified with development tools. The test results verify that the heuristic fuzz testing framework based on parameter weight achieved the expected effect.
引用
收藏
页码:1354 / 1358
页数:5
相关论文
共 50 条
  • [41] Detecting communication protocol security flaws by formal fuzz testing and machine learning
    Shu, Guoqiang
    Hsu, Yating
    Lee, David
    FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2008, 2008, 5048 : 299 - 304
  • [42] Analysis and Research on Distributed Network Protocol Testing Controllability Problem
    Wang, Xiao
    Zhang, Jin Hua
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015, 21 : 1163 - 1169
  • [43] Medical Information Research Based on Fuzz Integral
    Han, Yanan
    Song, Jinjie
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 139 - +
  • [44] Fuzz Testing in Stack-Based Buffer Overflow
    Bhardwaj, Manisha
    Bawa, Seema
    ADVANCES IN COMPUTER COMMUNICATION AND COMPUTATIONAL SCIENCES, VOL 1, 2019, 759 : 23 - 36
  • [45] User Based Fault Detection, Vulnerability Discovery and Patching: An Interdisciplinary Research
    Kapur, P. K.
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 27 - 33
  • [46] Research on Software Vulnerability Testing Based on Function-Call
    Zeng, Fanping
    Chen, Minghui
    Yin, Kaitao
    Wang, Xufa
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 564 - 568
  • [47] Fuzzing attacks for vulnerability discovery within MQTT protocol
    Casteur, G.
    Aubaret, A.
    Blondeau, B.
    Clouet, V.
    Quemat, A.
    Pical, V.
    Zitouni, R.
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 420 - 425
  • [48] DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing
    Tacliad, Francisco
    Nguyen, Thuy D.
    Gondree, Mark
    3RD ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2017), 2017, : 24 - 31
  • [49] UEFI Fuzz Testing Method Based on Heuristic Reverse Analysis
    Lin, Xin-Kang
    Gu, Kuang-Yu
    Zhao, Lei
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (08): : 3577 - 3590
  • [50] Machine Learning-Based Fuzz Testing Techniques: A Survey
    Zhang, Ao
    Zhang, Yiying
    Xu, Yao
    Wang, Cong
    Li, Siwei
    IEEE ACCESS, 2024, 12 : 14437 - 14454