Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network security protocol fuzz test method and system based on LSTM

A network security protocol and fuzz testing technology, applied in the field of network information security, can solve the problems of narrow test coverage of the target protocol, difficulty in reproducing complex verification algorithms or encryption algorithms, and low efficiency, so as to improve code coverage, The effect of improving fuzzing efficiency

Active Publication Date: 2019-02-22
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF7 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the target protocol is tested using the existing fuzzing methods, these verification algorithms or encryption algorithms will cause a large number of data packets in the target protocol to be discarded because they are invalid, resulting in the test coverage of the target protocol by the existing fuzzing tools Very narrow range and less efficient
Therefore, some fuzz testing methods have emerged to solve this problem by reproducing the verification algorithm or encryption algorithm of the target protocol, but the operation process is complicated and it is more difficult to reproduce complex verification algorithms or encryption algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security protocol fuzz test method and system based on LSTM
  • Network security protocol fuzz test method and system based on LSTM
  • Network security protocol fuzz test method and system based on LSTM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0044] figure 1 It is a schematic flowchart of an LSTM-based network security protocol fuzzing testing method provided by an embodiment of the present invention. Such as figure 1 As shown, the method includes the following steps:

[0045] S101. Fuzzing the target network security protocol by using the initial test case set;

[0046] S102. Perform a vulnerability analysis on t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network security protocol fuzz test method and system based on an LSTM. The method comprises the steps of: S1, carrying out an initial fuzz test on a target network security protocol by adopting an initial test case set; S2, carrying out vulnerability analysis on the target network security protocol according to a new execution path generated in the fuzz test process, andusing the new execution path as an initial seed file set; S3, using the initial seed file set as training data, and carrying out training by utilizing a deep neural network learner to obtain an LSTM model; and S4, generating a new test case set by utilizing the LSTM model so as to carry out the fuzz test on the target network security protocol. The system comprises a first fuzz test module, a vulnerability analysis module, an LSTM model generation module and a second fuzz test module. According to the invention, by training the LSTM neural network model to optimize a generation algorithm of test cases, so that a code coverage rate of the test cases is improved.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to an LSTM-based network security protocol fuzz testing method and system. Background technique [0002] With the continuous advancement of the information revolution, the network has become an indispensable part of people's lives. The safe transmission of sensitive information on the network is related to the development of individuals, enterprises and even the country. Security protocols provide users with information protection services in the Internet based on cryptographic algorithms, which is an important content in the field of information security. But at the same time, network security incidents broke out frequently, the number of network security vulnerabilities showed an increasing trend, and network information security faced a huge challenge. Therefore, it is of great practical significance to evaluate the security of network security protocols. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/12
CPCH04L63/1408H04L63/1433G06N3/126H04L63/168
Inventor 顾纯祥申莹珠陈熹石雅男李光松郑永辉
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products