期刊文献+

基于Q-学习算法的有状态网络协议模糊测试方法研究 被引量:4

Research on fuzzing method of stateful network protocol based on Q-learning algorithm
下载PDF
导出
摘要 现有的有状态网络协议模糊测试技术在测试时,辅助类型报文重复交互,测试效率低,且为确保测试用例有效性,仅向协议实体输入报文类型与被测状态相对应的测试用例,导致无法发现由报文异常输入顺序所引出的协议缺陷。针对这些问题,基于Q-学习算法设计出一种有状态网络协议模糊测试方法,不需要引导状态的辅助报文,且能在确保一定的测试用例有效性前提下,进行报文异常输入顺序测试。实验结果表明,所提出的模糊测试方法可以显著提高测试效率和漏洞挖掘能力。 For the current stateful network protocol fuzzing technology,the auxiliary type message repeated interaction affects the test efficiency and ensures the validity of the test case by inputting the corresponding test case according to the state of the protocol entity,so that the message abnormality input sequence test cannot be performed.In this paper,a stateful network protocol fuzzing method is designed based on Q-learning algorithm.The auxiliary message of the boot state is not required,and the message abnormality input sequence test can be performed under the premise of ensuring the validity of the test case.Experimental results show that this fuzzing method can significantly improve test efficiency and vulnerability mining capabilities.
作者 荆琛 傅晓彤 董伟 赵云飞 Jing Chen;Fu Xiaotong;Dong Wei;Zhao Yunfei(School of Cyber Engineering,Xidian University,Xi'an 710071,China;National Computer System Engineering Research Institute of China,Beijing 102209,China)
出处 《电子技术应用》 2020年第4期49-52,56,共5页 Application of Electronic Technique
关键词 模糊测试 漏洞挖掘 Q-学习算法 强化学习 fuzzing vulnerability mining Q-learning algorithm reinforcement learning
  • 相关文献

参考文献7

二级参考文献82

  • 1张宝峰,张翀斌,许源.基于模糊测试的网络协议漏洞挖掘[J].清华大学学报(自然科学版),2009(S2):2113-2118. 被引量:14
  • 2CHOI Y H, KIM H C, LEE D H. Tag-aware text file testing for security of a software system[A]. Procedings of International Conference on Convergence Information Technology[C]. IEEE Press, 2007.2254-2259.
  • 3LIU Q X, ZHANG Y Q. TFTP vulnerability finding technique based on fuzzing[J]. Computer Communications. Elsevier, 2008. 31(14): 3420-3426.
  • 4GODEFROID P, KLARLUND N, SEN K. DART: directed automated random testing[A]. Proce of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation[C]. 2005.40-6.
  • 5FROID P G- EVIN L M Y D, et al. Automated whitebox fuzz test- ing[A]. Procof Network and Distributed Systems Security(NDSS)[C]. 2008. 151-166.
  • 6WANG T L, WEI T, GU G E et al. TaintScope: a Checksum-aware directed fuzzing tool for automatic software vulnerability detection[A] The 31st IEEE Symposium on Security and Privacy[C]. Berkeley, California, USA, 2010.
  • 7DEMOTT J, ENBODY R, PUNCH B. Revolutionizing the field of grey-box attack surface testing with evolutionary Fuzzing[EB/OL]. http://www.b mott, 2012. usa-07/bh-usa-07-speakers.html#De.
  • 8COELLO C A, LAMONT G B, VELDHUIZEN A V. Evolutionary Algorithms for Solving Multi-Objective Problems[M]. New York: Springer-Verlag, 2007.
  • 9SPARKS S, EMBLETON S, et al. Automated vulnerability analysis: leveraging control flow for evolutionary input crafting[A]. Proc of Computer Security Applications Conference[C]. 2007.477-486.
  • 10DALLMEIER V, KNOPP N, MALLON C, et al. Automatically generating test cases for specification mining[J]. IEEE Transactions on Software Engineering, 2012.38(2):243-257.

共引文献63

同被引文献52

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部