首页> 外文会议>International Conference on Intelligent Systems and Knowledge Engineering >Network Protocol Automatic Vulnerability Mining Technology Based on Fuzzing
【24h】

Network Protocol Automatic Vulnerability Mining Technology Based on Fuzzing

机译:基于模糊的网络协议自动漏洞挖掘技术

获取原文

摘要

With the increasing complexity and importance of network applications, the security requirements for network protocols are getting higher and higher. Fuzzing, as one of the important Testing techniques to discover undisclosed vulnerabilities, tests the security of network protocols by producing and sending large amounts of data and injecting them into software, many important vulnerabilities such as denial of service, buffer overflows, and formatting strings can be found. Manual generation of test cases can be more appropriate to the target under test, but manual Fuzzing requires accurate understanding of network protocol details and tedious work to construct a large number of test data sets, resulting in limited coverage and poor effect. In order to solve this problem, this paper first investigates the types of vulnerabilities, summarizes the fuzzy strategies, and then constructs a fuzzer based on the existing framework, adopts mutation strategy to construct malformed network packets, which are sent to the tested target for testing. The results show that this method is more efficient than manual analysis in vulnerability mining, which provides a good foundation for improving the security of network protocols.
机译:随着网络应用的复杂性和重要性的日益提高,对网络协议的安全性要求也越来越高。模糊测试是发现未公开漏洞的重要测试技术之一,它通过生成和发送大量数据并将其注入软件来测试网络协议的安全性,许多重要漏洞如拒绝服务,缓冲区溢出和格式化字符串被发现。手动生成测试用例可能更适合被测对象,但是手动Fuzzing需要准确了解网络协议的详细信息以及繁琐的工作来构造大量测试数据集,从而导致覆盖范围有限且效果不佳。为了解决这个问题,本文首先研究了漏洞的类型,总结了模糊策略,然后在现有框架的基础上构造了模糊器,采用变异策略构造了畸形的网络报文,并发送给被测对象进行测试。 。结果表明,该方法在漏洞挖掘中比人工分析更有效,为提高网络协议的安全性提供了良好的基础。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号