Abstract:
Improper network protocol implementations usually bring about serious consequences. Therefore, network protocol security testing has become a hot area of research in netw...Show MoreMetadata
Abstract:
Improper network protocol implementations usually bring about serious consequences. Therefore, network protocol security testing has become a hot area of research in network and information security. Popular vulnerability discovery techniques include static analysis, dynamic analysis, fuzzing and so on. With the increasing scale and complexity of software, fuzzing has incomparable advantages over other vulnerability discovery techniques and becomes the most common and effective one in network protocol security testing. Firstly, this paper introduces the basic principle and classification of network protocol fuzzing. Then this paper briefly shows the basic process of network protocol fuzzing and the fundamental structure of a network protocol fuzzing system. Next, this paper describes research advances of network protocol fuzzing techniques and machine learning techniques applied to network protocol fuzzing in details. Finally, this paper concludes some existing problems of network protocol fuzzing techniques and discusses future research directions.
Published in: 2021 IEEE 4th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC)
Date of Conference: 18-20 June 2021
Date Added to IEEE Xplore: 19 July 2021
ISBN Information:
ISSN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Communication Protocol ,
- Machine Learning Techniques ,
- Information Security ,
- Implementation Of Protocol ,
- Complex Software ,
- Hot Research Area ,
- Artificial Neural Network ,
- Source Code ,
- State Machine ,
- Manual Analysis ,
- Important Milestone ,
- Security Vulnerabilities ,
- Data Block ,
- Potential Vulnerability ,
- Target Program ,
- Hot Topics ,
- Industrial Networks ,
- Mutation Strategy ,
- Single Message ,
- Test Case Generation ,
- Messaging Protocol ,
- Gene-based Methods ,
- Black-box Approach ,
- Lot Of Manpower ,
- Types Of Vulnerabilities ,
- Seq2seq Model
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Communication Protocol ,
- Machine Learning Techniques ,
- Information Security ,
- Implementation Of Protocol ,
- Complex Software ,
- Hot Research Area ,
- Artificial Neural Network ,
- Source Code ,
- State Machine ,
- Manual Analysis ,
- Important Milestone ,
- Security Vulnerabilities ,
- Data Block ,
- Potential Vulnerability ,
- Target Program ,
- Hot Topics ,
- Industrial Networks ,
- Mutation Strategy ,
- Single Message ,
- Test Case Generation ,
- Messaging Protocol ,
- Gene-based Methods ,
- Black-box Approach ,
- Lot Of Manpower ,
- Types Of Vulnerabilities ,
- Seq2seq Model
- Author Keywords