首页> 美国卫生研究院文献>other >Protocol vulnerability detection based on network traffic analysis and binary reverse engineering
【2h】

Protocol vulnerability detection based on network traffic analysis and binary reverse engineering

机译:基于网络流量分析和二进制逆向工程的协议漏洞检测

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE.
机译:网络协议漏洞检测在许多领域中都扮演着重要角色,包括协议安全性分析,应用程序安全性和网络入侵检测。在这项研究中,通过分析网络协议的通用模糊测试方法,我们提出了一种将网络流量分析与二进制逆向工程方法相结合的新颖方法。对于网络流量分析,引入了基于块的协议描述语言来构建测试脚本,而二进制逆向工程方法则采用了具有适应性功能的遗传算法,旨在关注代码覆盖率。这种结合导致对网络协议的模糊测试有了实质性的改进。我们构建了一个原型系统,并用它来测试几种实际的网络协议实现。实验结果表明,与诸如SPIKE之类的常规模糊测试方法相比,该方法可以更有效地检测漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号