Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Distributed heterogeneous network vulnerability mining method based on Fuzzing algorithm

A vulnerability mining and heterogeneous network technology, applied in the direction of electrical components, transmission systems, etc., can solve problems such as unfavorable analysis, insufficient protocol coverage efficiency, artificial interference, etc., to improve coverage and effectiveness, comprehensive protocol operation path, The effect of lowering barriers to entry

Inactive Publication Date: 2017-08-15
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF5 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0022] Although the Fuzzing testing technology that exists at this stage is relatively mature, it still has some shortcomings and there is room for further improvement.
[0023] 1. Existing fuzzing testing technology is not efficient enough for protocol coverage. Many technical solutions can only test certain states and fields of the corresponding protocol, but cannot completely cover the execution path of the entire protocol, which leads to the failure of vulnerability mining. Not efficient enough
[0024] 2. Existing fuzzing testing technology has a low degree of automation. Many testing technologies rely on manual input, or a large amount of manual interference, and there is no friendly human-computer interaction interface available, which leads to the failure of vulnerability mining and fuzzing testing. The threshold is too high and it is not easy to promote on a large scale
[0025] 3. Many of the existing fuzzing testing technologies lack the corresponding data persistence layer, which is not conducive to subsequent further analysis, resulting in a greatly reduced effect of vulnerability mining and testing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed heterogeneous network vulnerability mining method based on Fuzzing algorithm
  • Distributed heterogeneous network vulnerability mining method based on Fuzzing algorithm
  • Distributed heterogeneous network vulnerability mining method based on Fuzzing algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0061] Such as image 3 As shown, the distributed heterogeneous network vulnerability mining method based on Fuzzing algorithm described in the present invention comprises the following steps:

[0062] Step 1, protocol analysis: capture the network data packets of the test target, analyze the network protocol of the test target, and determine the protocol used by the test target and the corresponding protocol key information;

[0063] Step 2, protocol test script construction: According to the results of protocol analysis, comprehensively describe the key information of the protocol, model different data formats accordingly, and determine the various data formats and corresponding fields displayed by the protocol Information, the output is the information vector of the corresponding protocol data, that is, the protocol test script is generated;

[0064] Ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a distributed heterogeneous network vulnerability mining method based on the Fuzzing algorithm. The method comprises the following steps: performing automatic analysis on a network protocol of a test target, and determining protocol key information of the test target; performing comprehensive description on the protocol key information, combining the protocol key information into a specific data structure, and constructing a protocol test script; combining operation states of the protocol into a protocol vulnerability mining path map according to the protocol test script; sending a test script to the test target according to the protocol vulnerability mining path map and a control instruction, sending the control instruction to a target monitor, and receiving monitoring information from the target monitor; and storing the sent test script and the tested vulnerability information, and displaying the same in an information display interface. By adoption of the distributed heterogeneous network vulnerability mining method provided by the invention, the coverage and validity of protocol mining are improved, and the leakage probability of the vulnerability is reduced; and a friendly operation interface is provided to display corresponding information in real time, thereby facilitating the user check ad reducing the entry threshold of vulnerability mining.

Description

technical field [0001] The invention relates to the technical field of network vulnerability mining, in particular to a distributed heterogeneous network vulnerability mining method based on Fuzzing algorithm. Background technique [0002] In the development process of software and hardware products, product testing is a very important and indispensable process. Therefore, major manufacturers pay great attention to the testing process of software and hardware products. Common testing techniques for software and hardware products include: white box testing, Black box testing and gray box testing etc. Different testing methods require different levels of resources of the system under test, and black-box testing hardly requires any resources of the system under test. In a distributed heterogeneous network, various network devices are numerous and complex, and software products are also diverse. Therefore, black-box testing and gray-box testing can achieve better results in dis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 张陆勇王建章许德森赵鹏李东垣王国相郭冰楠朱佩佩李璇单路超
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products