Machine Learning for Black-Box Fuzzing of Network Protocols

被引:6
作者
Fan, Rong [1 ]
Chang, Yaoyao [1 ]
机构
[1] Beijing Inst Technol, Beijing, Peoples R China
来源
INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017 | 2018年 / 10631卷
关键词
Black-box fuzzing; Proprietary network protocol; Machine learning;
D O I
10.1007/978-3-319-89500-0_53
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As the network services are gradually complex and important, the security problems of their protocols become more and more serious. Vulnerabilities in network protocol implementations can expose sensitive user data to attackers or execute arbitrary malicious code deployed by attackers. Fuzzing is an effective way to find security vulnerabilities for network protocols. But it is difficult to fuzz network protocols if the specification and implementation code of the protocol are both unavailable. In this paper, we propose a method to automatically generate test cases for black-box fuzzing of proprietary network protocols. Our method uses neural-network-based machine learning techniques to learn a generative input model of proprietary network protocols by processing their traffic, and generating new messages using the learnt model. These new messages can be used as test cases to fuzz the implementations of corresponding protocols.
引用
收藏
页码:621 / 632
页数:12
相关论文
共 21 条
[1]  
Amini Pedram, 2013, Sulley: Pure python fully automated and unattended fuzzing framework
[2]  
[Anonymous], 2007, DEFCON
[3]  
Beddoe M., 2004, The protocol informatics project
[4]  
Caballero J, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P317
[5]   Symbolic Execution for Software Testing: Three Decades Later [J].
Cadar, Cristian ;
Sen, Koushik .
COMMUNICATIONS OF THE ACM, 2013, 56 (02) :82-90
[6]  
Cadar C, 2011, 2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), P1066, DOI 10.1145/1985793.1985995
[7]   Static analysis for security [J].
Chess, B ;
McGraw, G .
IEEE SECURITY & PRIVACY, 2004, 2 (06) :76-79
[8]  
Cho K., 2014, P 2014 C EMP METH NA, P1724
[9]   Prospex: Protocol Specification Extraction [J].
Comparetti, Paolo Milani ;
Wondracek, Gilbert ;
Kruegel, Christopher ;
Kirda, Engin .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :110-+
[10]  
Cui W, 2007, P 16 USENIX SEC S US, P1