Private protocol fuzzy test case generation method based on byte length classification
A proprietary protocol, byte-length technology, applied in electrical components, transmission systems, etc., can solve the problems of low test efficiency and low positioning accuracy, and achieve the effect of high real-time performance and low technical level
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0030] Example 1
[0031] For the open communication protocol of industrial control system, we can clearly know the content of the protocol according to the protocol specification, and then specify the test strategy, but for the private protocol, we can't know the content of the protocol specification, so we need to analyze the protocol preliminarily. At present, the fuzzy testing methods of industrial control systems have some shortcomings, such as too simple and random fuzzy data, low accuracy of abnormal location, low testing efficiency, etc. In addition, testers need to be very familiar with protocols, and the current fuzzy testing methods for private protocols of industrial control systems can't meet the requirements of high standards, high coverage and high efficiency.
[0032] refer to Figure 1 ~ 3 An embodiment of the present invention provides a method for generating fuzzy test cases of private protocols based on byte length classification, which includes:
[0033] S1: Co...
Example Embodiment
[0060] Example 2
[0061] The technical effect adopted in this method is verified and explained. In this embodiment, OpenVAS (Open Vulnerability Assessment System) is selected to conduct a comparative test with this method, and the test results are compared by means of scientific demonstration to verify the real effect of this method.
[0062] Among them, OpenVAS (Open Vulnerability Assessment System) is a network scanner with related tools. Its core component is a server, including a set of network vulnerability testing programs, which can detect security problems in remote systems and applications. such as Figure 1 As shown in, using Kitty fuzzy testing framework combined with industrial control protocol components in ISF and traditional technical solutions, the fuzzy testing of Siemens S7comm protocol is carried out to mine vulnerabilities. First, Kitty sets the interface and target, and can connect with the target three times and COTP twice. Then, it calls the original protoco...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap