Camera network protocol fuzzy test method based on FSM

A fuzzy test and network protocol technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., to achieve highly targeted effects

Inactive Publication Date: 2021-01-15
HARBIN ENG UNIV
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since 2013, the camera equipment of a well-known domestic manufacturer has been exposed to have multiple serious vulnerabilities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Camera network protocol fuzzy test method based on FSM
  • Camera network protocol fuzzy test method based on FSM
  • Camera network protocol fuzzy test method based on FSM

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] There are 4 steps in total, such as figure 1 Shown:

[0049] A. Collect camera information;

[0050] B. Use the mutation method to generate fuzzy test cases;

[0051] C. Test the device using fuzz test cases;

[0052] D. Generate a fuzz test report.

[0053] 1. The collection of camera information is completed by the fingerprint detection module, which will identify the logo of the general networked camera, the model specification of the network camera, and the HTTP protocol information of the camera. The detection process is as follows: figure 2 shown.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network protocol vulnerability mining, and particularly relates to a camera network protocol fuzzy test method based on an FSM. According to the invention, the problems of more network protocol vulnerabilities and immature fuzzy test method of the current camera are overcome, and the protocol vulnerabilities can be effectively detected. The originaldata can be automatically generated, and the state transition diagram is automatically generated according to the state transition form. According to the method, the pertinence is higher, vulnerability information of SIP and RTSP protocols can be provided, and security analysts are helped to complete subsequent work.

Description

technical field [0001] The invention belongs to the technical field of network protocol loophole mining, and in particular relates to an FSM-based camera network protocol fuzzy testing method. Background technique [0002] With the proliferation of IoT devices, connected cameras are making their way into homes as home security devices. Attackers are exploiting a security flaw in some networked surveillance cameras to spy on the privacy of other homes. [0003] On April 17, 2015, CNCERT released the report "Notice on Monitoring Devices with High-Risk Vulnerabilities that Can Be Intruded and Controlled and Launched Network Attacks." Since 2013, the camera equipment of a well-known domestic manufacturer has been exposed to have multiple serious loopholes. In March 2015, the National Information Security Vulnerability Sharing Platform (CNVD) announced four high-risk vulnerability incidents related to the manufacturer's IoT devices. The main hazard is the remote control of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06H04L29/08
CPCH04L43/18H04L63/1408H04L63/1433H04L69/08H04L67/02H04L65/1104
Inventor 郎大鹏程俊杰李子豫马成陈宇刘翔宇
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products