IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering

被引:8
|
作者
Luo, Jian-Zhen [1 ]
Shan, Chun [1 ]
Cai, Jun [1 ]
Liu, Yan [1 ]
机构
[1] Guangdong Polytech Normal Univ, Sch Elect & Informat, Guangzhou 510665, Guangdong, Peoples R China
来源
SYMMETRY-BASEL | 2018年 / 10卷 / 11期
基金
中国国家自然科学基金;
关键词
vulnerability detection; IoT security; change-point detection; protocol reverse engineering; NETWORK;
D O I
10.3390/sym10110561
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Fuzzing is regarded as the most promising method for protocol vulnerabilities discovering in network security of Internet of Things (IoT). However, one fatal drawback of existing fuzzing methods is that a huge number of test files are required to maintain a high test coverage. In this paper, a novel method based on protocol reverse engineering is proposed to reduce the amount of test files for fuzzing. The proposed method uses techniques in the field of protocol reverse engineering to identify message formats of IoT application-layer protocol and create test files by generating messages with error fields according to message formats. The protocol message treated as a sequence of bytes is assumed to obey a statistic process with change-points indicating the boundaries of message fields. Then, a multi-change-point detection procedure is introduced to identify change-points of byte sequences according to their statistic properties and divide them into segments according to their change-points. The message segments are further processed via a position-based occurrence probability test analysis to identify keyword fields, data fields and uncertain fields. Finally, a message generation procedure with mutation operation on message fields is applied to construct test files for fuzzing test. The results show that the proposed method can effectively find out the message fields and significantly reduce the amount of test files for fuzzing test.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Application-Layer DDoS Attack Detection Using Explicit Duration Recurrent Network-Based Application-Layer Protocol Communication Models
    Xie, Bailin
    Wang, Yu
    Wen, Guogui
    Xu, Xiaojun
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2023, 2023
  • [2] Dynamic application-layer protocol analysis for network intrusion detection
    Dreger, Holger
    Feldmann, Anja
    Mai, Michael
    Paxson, Vern
    Sommer, Robin
    [J]. USENIX Association Proceedings of the 15th USENIX Security Symposium, 2006, : 257 - 272
  • [3] Application-layer Anomaly Detection Based on Application-layer Protocols' Keywords
    Xie, Bailin
    Zhang, Qiansheng
    [J]. PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 2131 - 2135
  • [4] A lightweight application-layer signaling protocol
    Kitamura, Tsutomu
    Shizuno, Takayuki
    Okabe, Toshiya
    Tani, Hideaki
    [J]. 2009 FIRST ASIAN CONFERENCE ON INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2009, : 448 - 452
  • [5] An IoT Application-Layer Protocol Modem: A Case Study on Interfacing IEEE 1888 with AT Commands
    Zhang, Zhiqing
    Ochiai, Hideya
    Esaki, Hiroshi
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 346 - 349
  • [6] SAMP: Scalable application-layer mobility protocol
    Pack, S
    Park, K
    Kwon, T
    Choi, Y
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2006, 44 (06) : 86 - 92
  • [7] Application-Layer Protocol for Collaborative Multimedia Presentations
    Eenjun Hwang
    B. Prabhakaran
    [J]. Multimedia Tools and Applications, 2003, 21 : 103 - 123
  • [8] An application-layer multicasting protocol for distributed collaboration
    Shirmohammadi, S
    Diabi, A
    Lacombe, P
    [J]. 2005 IEEE International Workshop on Haptic Audio Visual Environments and their Applications, 2005, : 139 - 142
  • [9] An approach to application-layer DoS detection
    Kemp, Cliff
    Calvert, Chad
    Khoshgoftaar, Taghi M.
    Leevy, Joffrey L.
    [J]. JOURNAL OF BIG DATA, 2023, 10 (01)
  • [10] An approach to application-layer DoS detection
    Cliff Kemp
    Chad Calvert
    Taghi M. Khoshgoftaar
    Joffrey L. Leevy
    [J]. Journal of Big Data, 10