Supercharge Your Innovation With Domain-Expert AI Agents!

PEACH platform extension method for GUI-based protocol state machine modeling

A protocol state and state machine technology, applied in the computer field, can solve problems such as error-prone, unintuitive protocol state machine, increased workload, etc., to reduce the difficulty, avoid trivial details, and facilitate the implementation of operations.

Inactive Publication Date: 2013-09-25
BEIJING UNIV OF POSTS & TELECOMM
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the syntax of PitFile is an XML-based language, and the protocol state machine described by it is not intuitive enough. In addition, protocol security experts need to focus part of their energy on learning tedious syntax details rather than on the description of the network protocol state machine. Increased workload and error-prone

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PEACH platform extension method for GUI-based protocol state machine modeling
  • PEACH platform extension method for GUI-based protocol state machine modeling
  • PEACH platform extension method for GUI-based protocol state machine modeling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to clearly illustrate the technical solution of the present invention, specific usage examples are given below and detailed descriptions are given in conjunction with the accompanying drawings.

[0022] The present invention assumes that the protocol state transitions are definite, that is, definite input or output messages correspond to definite state transitions, and there is no probability jump problem between states. Here, take the ISAKMP (Internet Security Association and Key Management Protocol) protocol as an example to illustrate the specific usage steps of the present invention:

[0023] Step 1: Refer to the ISAKMP protocol specification and build a corresponding test environment so that network entities can communicate normally based on the ISAKMP protocol.

[0024] Step 2: When the network entity is in normal communication, use wireshark to capture its communication traffic, and save each message as a file in xml format. For specific format s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a PEACH platform extension method for GUI-based protocol state machine modeling. The method includes: describing a graphical user interface and a modeling process of a protocol state machine; converting the protocol state machine in the graphical format into a state machine in an SCXML format; and converting the protocol state machine in the SCXML format into a PitFile state machine inside the PEACH. The method has the advantages that different types of work during the protocol testing process are separated; creative research work is done by protocol security experts, complex PitFile grammar learning and mechanical PitFile compiling are completed by a computer, and accordingly work efficiency of the protocol security experts is improved greatly. In addition, the SCXML is used as an intermediate file to correlate the graphical user interface and the PitFile, and accordingly extensibility is high and the method is simple and effective and is convenient to implement and operate.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a network protocol testing method based on a protocol model. Background technique [0002] The problem of network security has been paid enough attention by people, protocol robustness test is an effective measure to ensure the quality of network software. How to discover the flaws hidden in network software with minimum overhead is an important research direction in the field of network security. Usually, the network protocol specification defines two aspects: the format specification inside the message and the timing specification between the messages. Therefore, the robustness test of the protocol is also carried out based on these two aspects, and currently it mainly focuses on the test of the internal format specification of the message, and the test based on the message timing specification (that is, the protocol state machine) is just in its infancy. [0003] In the fi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/36
Inventor 张华张钊王浩赵凯温巧燕
Owner BEIJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More