Back to Search Start Over

Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.

Authors :
Wen, Shameng
Meng, Qingkun
Feng, Chao
Tang, Chaojing
Source :
PLoS ONE. 10/19/2017, Vol. 12 Issue 10, p1-14. 14p.
Publication Year :
2017

Abstract

Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel approach that combines network traffic analysis with the binary reverse engineering method. For network traffic analysis, the block-based protocol description language is introduced to construct test scripts, while the binary reverse engineering method employs the genetic algorithm with a fitness function designed to focus on code coverage. This combination leads to a substantial improvement in fuzz testing for network protocols. We build a prototype system and use it to test several real-world network protocol implementations. The experimental results show that the proposed approach detects vulnerabilities more efficiently and effectively than general fuzzing methods such as SPIKE. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
19326203
Volume :
12
Issue :
10
Database :
Academic Search Index
Journal :
PLoS ONE
Publication Type :
Academic Journal
Accession number :
125792554
Full Text :
https://doi.org/10.1371/journal.pone.0186188