Study and Design on Vulnerability Discovering of Network Protocols

Article Preview

Abstract:

Discovering the vulnerabilities in network protocols is the key for network attacks and defenses. Basing on the analysis of some currently used vulnerability discovering methods, a method combining reverse engineering and fuzzy testing is put forward for vulnerability discovering of network protocols, where reverse engineering method is first used to analyze the details of the communication protocol, then fuzzy testing is used to test the target software. This combination can promote the efficiency of the fuzzy testing. By using this method to test a real network application, several vulnerabilities are discovered, which verifies the validity of this method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

5526-5530

Citation:

Online since:

May 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Xu Lianghua, Sun Yulong, Gao Feng and Zhu Luhua: Research on Discovering Software Vulnerabilities Based on Reverse Engineering.  Microcomputer Information . 22(8-3)(2006). pp.259-261.

Google Scholar

[2] Chen Ming. Study on Reverse Analysis of software Vulnerability. Master Dissertation, University of Electronic Science and Technology of China. (2007).

Google Scholar

[3] Wu Zhiyong, Wang Hongchuan, Sun Lechang, Pan Zulie and LIU Jingju: Survey on Fuzzing. Application Research of Computers. 27(3)(2010). pp.829-832.

Google Scholar

[4] Zhang Baofeng, Zhang Chongbin and Xu Yuan: Network protocol vulnerability discovery based on fuzzy testing. Journal of Tsinghua Univ ( Sci & Tech) . 49( S2)( 2009). pp.2113-2118.

Google Scholar

[5] Li WeiMing, Zhang AiFang, Liu JianCai and Li ZhiTang: An Automatic Network Protocol Fuzz Testing and Vulnerability Discovering Method. Chinese Journal of Computers. 34(2)(2011). P. 242-254.

DOI: 10.3724/sp.j.1016.2011.00242

Google Scholar