Research on Network Protocol Vulnerability Discovery Based on Fuzz Testing

被引:0
|
作者
Li, Mingxuan [1 ]
He, Ling [1 ]
Teng, YangXin [1 ]
Wang, Xu [1 ]
Zhang, Jianye [2 ]
Qing, Song [2 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Informat & Commun Technol Ctr, Urumqi, Peoples R China
[2] State Grid Xinjiang Elect Power Co, Urumqi, Peoples R China
来源
PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC) | 2017年
关键词
network protocol vulnerability discovery; fuzz testing; heuristic test case generation; Peach;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the network application programs are developed rapidly, and the requirement of network protocol security is continually improved, the fuzz testing has become the research hotspot. On the basis of summarizing the current research direction, the identification method and test case generation of network protocol are researched emphatically. The heuristic fuzz testing framework based on parameter weight is proposed according to heuristic search algorithm and probability weights. The existing fuzz testing and vulnerability mining tool Peach is selected for extension, in which the heuristic input tracking technology based on parameter weight is adopted by the data generation module; IDAPRO is used to extract the function's heuristic factor to form the heuristic rules, and then the heuristic rules are used to guide the test case generation process; the transmission order of test cases is determined based on parameter weight. Finally, the commonly-used FTP protocol was verified with development tools. The test results verify that the heuristic fuzz testing framework based on parameter weight achieved the expected effect.
引用
收藏
页码:1354 / 1358
页数:5
相关论文
共 26 条
  • [21] Key Data Location Method for Fuzz Testing Based on Path Label and Data Mutation
    Jiao L.-L.
    Luo S.-L.
    Liu W.-T.
    Pan L.-M.
    Pan, Li-Min (panlimin2016@gmail.com), 1600, Beijing Institute of Technology (40): : 1009 - 1017
  • [22] Dynamic fuzz testing of UAV configuration parameters based on dual guidance of fitness and coverage
    Ma, Yuexuan
    Yu, Xiao
    Zhang, Li
    Li, Zhao
    Li, Yuanzhang
    Tan, Yu-an
    CONNECTION SCIENCE, 2024, 36 (01)
  • [23] Fuzz: Genetic Algorithm-based Fuzzing for Stress Testing Congestion Control Algorithms.
    Ray, Devdeep
    Seshan, Srinivasan
    THE 21ST ACM WORKSHOP ON HOT TOPICS IN NETWORKS, HOTNETS 2022, 2022, : 31 - 37
  • [24] Adversarial generation method for smart contract fuzz testing seeds guided by chain-based LLM
    Sun, Jiaze
    Yin, Zhiqiang
    Zhang, Hengshan
    Chen, Xiang
    Zheng, Wei
    AUTOMATED SOFTWARE ENGINEERING, 2025, 32 (01)
  • [25] Mutation Based SQL Injection Test Cases Generation for the Web Based Application Vulnerability Testing
    Ilies, Benikhlef
    Wang Chenghong
    Sangirov, Gulomjon
    Proceedings of the 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016), 2016, 67 : 546 - 551
  • [26] A Model-based Approach to Security Flaw Detection of Network Protocol Implementations
    Hsu, Yating
    Shu, Guoqiang
    Lee, David
    16TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS: ICNP'08, 2008, : 114 - 123