期刊文献+

IMS网络Diameter协议流程漏洞挖掘 被引量:2

Leak Mining of Diameter Protocol Flow for IMS Network
下载PDF
导出
摘要 为挖掘IP多媒体子系统网络异常场景下Diameter协议流程中潜在的脆弱点,提出一种基于遗传算法的Diameter协议流程漏洞挖掘方法。通过变异网络配置、用户注册状态和服务器工作状态等,制造特定的应用场景,采用遗传算法对正常消息进行变异,生成针对该场景的多维模糊测试消息,通过监测网络对测试消息的响应判断是否存在相关脆弱性。仿真实验结果表明,该生成方法能保证测试消息的随机性,并有效挖掘Diameter协议流程相关的漏洞。 In order to mine the potential vulnerabilities in Diameter protocol dialog flow of IP Multimedia Subsystem(IMS) abnormal scenarios, this paper proposes a leak mining method of Diameter protocol flow based on the Genetic Algorithra(GA). The method makes a given scenario by mutating network configuration, user state, and servers' state. And generates multi-dimension fuzziness test data for the scenario using GA. This paper makes decisions that whether there are related vulnerabilities by watching the network's response to the test messages. Simulation experimental result shows that the test messages' generating method both ensures the messages' randomness and improves the effectiveness, it can mine the vulnerabilities of Diameter protocol flow effectively.
出处 《计算机工程》 CAS CSCD 2013年第9期6-11,共6页 Computer Engineering
基金 国家"863"计划基金资助项目(2011AA010605)
关键词 IP多媒体子系统网络 异常场景 DIAMETER协议 会话流程 遗传算法 漏洞挖掘 IP Mukimedia Subsystem(IMS) network abnormal scenarios Diameter protocol session flow genetic algorithm leak mining
  • 相关文献

参考文献14

  • 1Calhoun P, Loughney J. Diameter Base Protocol[S]. RFC 3588, 2003.
  • 2张友春,魏强,刘增良,周颖.信息系统漏洞挖掘技术体系研究[J].通信学报,2011,32(2):42-47. 被引量:16
  • 3李伟明,张爱芳,刘建财,李之棠.网络协议的自动化模糊测试漏洞挖掘方法[J].计算机学报,2011,34(2):242-255. 被引量:67
  • 4Hsu Y. A Model-based Approach to Security Flaw Detection of Network Protocol Implementations[C]//Proc. of International Conference on Network Protocols. Orlando, Finland: IEEE Press, 2008.
  • 5Duchene F, Groz R. XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing[C]//Proc. of the 5th International Conference on Software Testing. Montreal, Canada: IEEE Press, 2012.
  • 6、畏志勇,王红川.遗传算法在多维Fuzzing技术中的应用[J].小微型计算机系统,2011,32(5):998.1004.
  • 7Ahmed M A, Hermadi I. GA-based Multiple Paths Test Data Generator[J]. Computers & Operations Research, 2008, 35(10): 3107-3124.
  • 8Sofokleous A A, Andreou A S. Automatic Evolutionary Test Data Generation for Dynamic Software Testing[J]. The Journal of Systems and Software, 2008, 81(11): 1883-1898.
  • 9Juuso A M, Rontti T. Securing Next Generation Networks by Fuzzing Protocol Implementations[C]//Proc. of Technical Symposium at ITU Telecom World. Oulu, Finland: IEEE Press, 2011.
  • 10Wang Daping. An XML-based Testing Strategy for Probing Security Vulnerabilities in the Diameter Protocol[J]. Bell Labs Technical Journal, 2007, 12(3): 79-93.

二级参考文献4

共引文献79

同被引文献16

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部