Automatic vulnerability discovery system and method based on protocol reverse parsing

A protocol reverse and loophole mining technology, applied in transmission systems, electrical components, etc., can solve the problems of high target object authority requirements, lower target object authority requirements, and low degree of automation, so as to reduce authority requirements, improve efficiency and automation. , the effect of expanding the scope of application

Inactive Publication Date: 2014-11-26
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF3 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The problem solved by the technology of the present invention: Aiming at the deficiency that the existing vulnerability mining technology is not highly automated and requires too high authority of the target object, an aut

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic vulnerability discovery system and method based on protocol reverse parsing
  • Automatic vulnerability discovery system and method based on protocol reverse parsing
  • Automatic vulnerability discovery system and method based on protocol reverse parsing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0026] Such as figure 1 As shown, the automatic vulnerability mining system based on protocol reverse analysis in the present invention combines the protocol reverse analysis technology and fuzzy testing technology to effectively improve the automation of network service software vulnerability mining. The system includes a server and a client, and the server includes process monitoring. module and a network monitoring module; the client includes a packet preprocessing module, a packet classification module, a packet format extraction module, an input control module and a session control module. The main implementation steps of the system are as follows:

[0027] (1) Message preprocessing

[0028] Message preprocessing first captures the communication data packets of the target test object, then processes the data packets, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an automatic vulnerability discovery system and method based on protocol reverse parsing. The automatic vulnerability discovery system comprises a protocol reverse parsing module and a fuzz testing module, wherein the protocol reverse parsing module comprises a message preprocessing module, a message classifying module, a message format extracting module and the like, and the fuzz testing module comprises a process monitoring module, a network monitoring module, an input control module, a session control module and the like. The automatic vulnerability discovery system further comprises a server side and a client side, wherein the server side comprises a process monitoring module and a network monitoring module, and the client side comprises a message preprocessing module, a message classifying module, a message format extracting module, an input control module and a session control module. By means of the automatic vulnerability discovery system and method based on the protocol reverse parsing, the automation degree and efficiency of network service software vulnerability discovery are improved, the dependence on manual operation of the protocol analysis process is reduced, meanwhile the demand for the authority limit of a target object is reduced, and an application range is widened.

Description

technical field [0001] The invention relates to an automatic loophole mining system and method based on protocol reverse analysis, and belongs to the technical field of computer Internet. Background technique [0002] With the rapid development of information technology and the continuous progress of society, the importance of information to modern society is self-evident, and the ensuing information security issues have become particularly prominent. As an important part of information security, network security is related to national security and social stability, and its importance has become increasingly prominent with the acceleration of global informatization. [0003] For a long time, software security vulnerabilities, especially security vulnerabilities of network service software, have been the main root cause of various network security incidents. The vast majority of network intrusions are based on security vulnerabilities of network service software. An importan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 马恒太顾鼎锋吴晓慧刘小霞
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products