CN107046526A - Distributed heterogeneous network hole method for digging based on Fuzzing algorithms - Google Patents

Distributed heterogeneous network hole method for digging based on Fuzzing algorithms Download PDF

Info

Publication number
CN107046526A
CN107046526A CN201611235833.1A CN201611235833A CN107046526A CN 107046526 A CN107046526 A CN 107046526A CN 201611235833 A CN201611235833 A CN 201611235833A CN 107046526 A CN107046526 A CN 107046526A
Authority
CN
China
Prior art keywords
protocol
test
agreement
script
fuzzing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611235833.1A
Other languages
Chinese (zh)
Inventor
张陆勇
王建章
许德森
赵鹏
李东垣
王国相
郭冰楠
朱佩佩
李璇
单路超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CHINACOMM SYSTEM Co Ltd
Beijing University of Posts and Telecommunications
Original Assignee
CHINACOMM SYSTEM Co Ltd
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CHINACOMM SYSTEM Co Ltd, Beijing University of Posts and Telecommunications filed Critical CHINACOMM SYSTEM Co Ltd
Priority to CN201611235833.1A priority Critical patent/CN107046526A/en
Publication of CN107046526A publication Critical patent/CN107046526A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Abstract

The present invention relates to the distributed heterogeneous network hole method for digging based on Fuzzing algorithms.Step includes:Procotol to test target carries out automation parsing, determines the agreement key message of test target;Agreement key message is comprehensively described and specific data structure is combined into, protocol test script is built;According to protocol test script, each running status of agreement is combined into protocol bug excavation path profile;According to protocol bug excavation path profile and control instruction, test script is sent to test target, control instruction is sent to target monitor, the monitoring information from target monitor is received;The vulnerability information of the test script of transmission and test is stored, and shown in the presentation of information page.The present invention improves the coverage rate and validity of agreement excavation, reduces the omission probability of leak;Friendly operation interface is provided, corresponding information is shown in real time, is easy to user to check, reduce bug excavation enters gate threshold.

Description

Distributed heterogeneous network hole method for digging based on Fuzzing algorithms
Technical field
The present invention relates to network hole digging technology field, the distributed heterogeneous net based on Fuzzing algorithms is specifically Network bug excavation method.
Background technology
Among the development process of software and hardware product, the test of product is extremely important and essential process, because This major producer all focuses on the test process of software and hardware product very much, and the measuring technology of common software and hardware product includes:Whitepack Test, Black-box Testing and grey box testing etc..Different method of testing, it is desirable to obtain the resource of the different levels of system under test (SUT), its Middle Black-box Testing hardly requires any resource of any system under test (SUT).Among distributed heterogeneous network, the various network equipments Numerous and complicated, software product is also varied, therefore Black-box Testing and grey box testing, can be risen among distributed heterogeneous network To preferable effect.
In recent years, fuzz testing (Fuzzing tests) is widely used in as a kind of famous Black-box Testing technology Among software product testing.The principle of fuzz testing is:By sending unexpected input to test target and monitoring in output Exception find the failure in software or hardware.For typical case, fuzz testing utilizes semi-automatic or full-automatic What method was repeated provides input to test target, and monitors the running situation of test target in real time, observes the anti-of test target Should, and then expect to excavate corresponding leak.
There are two kinds currently used for the major way of fuzz testing technology, be respectively:Fuzz testing based on generation and it is based on The fuzz testing of variation.
Fuzz testing based on generation needs in advance to analyze and research to the form of procotol or file, and is retouched State out, protocal analysis personnel describe format specification by script file under normal circumstances, then according to these scripts text Part produces substantial amounts of test case, and on the one hand the data of construction will meet the format specification in script file, to prevent test mesh Mark directly abandons illegal use-case, does not reach the effect of test, on the other hand also to have specific characteristics as far as possible, such as boundary value, Format string etc., the possibility of increase triggering leak.
Fuzz testing based on variation is divided into random variation and inspired again to make a variation, and this fuzz testing algorithm needs a sample The sample that this document is constructed as test case.
Existing online fuzzy tests (Fuzzing tests), and it is mainly using Technical Architecture as shown in Figure 1 to test target Carry out bug excavation.The Technical Architecture may be roughly divided into two parts, and Part I is that fuzz testing engine section (referred to as draws Hold up), it is mainly responsible for producing corresponding test case, and according to the analysis result in sample file or script file, generation is corresponding Lopsided data, for the injection of follow-up test target, i.e., unexpected input.Part II is target monitoring module (abbreviation Agency), the part is mainly responsible for being monitored test target, its reaction relative to lopsided data input is observed, so that really Test target is determined with the presence or absence of corresponding leak.
The workflow of existing online fuzzy test (Fuzzing) is as follows:
Fuzzing tests are realized by sending substantial amounts of half valid data to test target and observing output result , it sends data using semi-automatic or full automatic mode.The workflow of Fuzzing tests typically can all include following Step, as shown in Figure 2:
(1) test target is determined
Determine that test target can make test definitely.The today developed rapidly in science and technology, fuzz testing has had More ripe development, for different test targets, selects corresponding instrument either test frame, can save and develop into This, saves the testing time.So, the determination of test target determines the type of selected testing tool and method.
(2) input matrix is analyzed
The generation of most security breaches is all because the input data to program is not verified or to illegal defeated Caused by entering not provide clear and definite processing standard, so, it is the key that Fuzzing tests success to determine input matrix. Input matrix should be included as far as possible can cause all kinds of unexpected inputs of program crashing, such as filename, registration table The information such as key assignments, command line parameter, configuration information, environmental variance.The test of blindness, may while waste of manpower and time Also the requirement of test can not be met.
(3) test case is constructed
After the content that input matrix should be included is analysed in depth, it is possible to construct test case according to analysis result. Fuzzing tests typically send input data by semi-automatic or full automatic mode, it is therefore desirable to which test case is write as Formal Languages, for example, be adapted to fuzz testing device Fuzzer and read and produce the script file of test case.Pass through artificial side Formula is constructed after test case formalization file, and follow-up test process can just be carried out by way of automation.At this During, test target is directed to, other factors are considered, suitable test case make is selected, accomplishes fluently leak The basis of excavation.
(4) fuzz testing is started
This process is usually an automation process, and it occurs parallel with previous step, while test case is constructed, Fuzz testing device meeting connecting test target, performs tested application, and send data to test target.
(5) monitoring exception and mistake
The step is an extremely important step, in a large amount of test cases of transmission, is not that each test is used Example can all cause test target to collapse, it is therefore desirable to causing the abnormal test case produced to record.Monitoring and record collapse Burst information it is most important for follow-up analysis work, if lacking this step, test target collapse after can not just determine be Which data result in abnormal generation, so that entirely test failure.
(6) analysis can utilize leak
The step in fuzz testing it is not necessary to a step, complete fuzz testing after, for the mistake detected It is by mistake and abnormal, to judge whether it has the possibility being utilized according to security purpose, this process is usually to have been manually done, analyst Suitable level and technology is needed, tester can submit to result security audit personnel, and without completing this by oneself Individual process.
The Fuzzing measuring technologies existed at this stage, although comparative maturity, but still there are some shortcomings, have Further improved space.
1. existing Fuzzing measuring technologies, the covering efficiency for agreement is not high enough, many technical schemes are merely able to phase The some states and field for the agreement answered are tested, it is impossible to the whole agreement implementation path of complete covering, therefore are caused The efficiency of bug excavation is not high enough.
2. existing Fuzzing measuring technologies, automaticity is relatively low, many measuring technologies are all relied on and are manually entered, Or substantial amounts of Human disturbance, also without available friendly human-computer interaction interface, cause bug excavation and Fuzzing to survey The threshold of examination is too high, is not easy to large-scale promotion.
3. existing Fuzzing measuring technologies, much lack corresponding Data Persistence Layer, it is unfavorable for follow-up further dividing Analysis, causes bug excavation and the effect of test to be had a greatly reduced quality.
The content of the invention
For defect present in prior art, it is an object of the invention to provide the distribution based on Fuzzing algorithms Heterogeneous network bug excavation method, it is adaptable to distributed heterogeneous network system, all standing of protocol status path, automaticity compared with It is high.
To achieve the above objectives, the present invention is adopted the technical scheme that:
Distributed heterogeneous network hole method for digging based on Fuzzing algorithms, comprises the following steps:
Step 1, protocol analysis:The network packet of test target is captured, the procotol to test target is parsed, Determine agreement used in test target and corresponding agreement key message;
Step 2, protocol test script is built:According to the result of protocol analysis, agreement key message is comprehensively retouched State, different data formats is modeled accordingly, determine a variety of data formats and phase that agreement is showed The field information answered, is output as the information vector of corresponding protocol data, that is, generates protocol test script;
Step 3, protocol bug excavation path profile is built:According to protocol test script, by each running status of agreement or Person's instruction is combined, and is connected into directed acyclic graph, i.e. protocol bug excavation path profile, characterizes the operating path of protocol stack;
Step 4, user transmits control instruction by master controller to script transmission flow controller, control bug excavation Pause and operation;
Step 5, script transmission flow controller is according to protocol bug excavation path profile and corresponding control instruction, to test Target sends corresponding test script, and corresponding control instruction is sent to target monitor, and target monitor is come from while receiving Monitoring information, to judge whether to trigger corresponding leak;
Step 6, data display and storage:Master controller is deposited the vulnerability information of the test script of transmission and test Storage, and shown in the presentation of information page.
On the basis of above-mentioned technical proposal, the agreement key message described in step 1 includes protocol format, verification side Formula, each state of agreement and instruction.
On the basis of above-mentioned technical proposal, using multisequencing progressive alignment algorithm to grabbing network data in step 1 Bag is parsed.
On the basis of above-mentioned technical proposal, protocol analysis specifically includes following steps described in step 1:
Step 11, substantial amounts of network packet is obtained;
Step 12, the network packet to crawl carries out preliminary treatment, filtering invalid data, recomposing fragmented data, extraction Application layer message;
Step 13, message analysis is carried out for the application layer message of acquisition, similar sequence of message is placed on a group In, it is convenient after format analysis when use, when carrying out message cluster and the classification of message group, using matched rule, will before Application layer message be divided into different packets;
Step 14, when protocol format is analyzed, analysis obtains message format, and the unit of analysis is obtained not in step 13 The message group of same type, by multisequencing progressive alignment algorithm, analyzes agreement key message.
On the basis of above-mentioned technical proposal, in step 2, the protocol test script includes protocol command form and agreement Text is described.
On the basis of above-mentioned technical proposal, in step 3, each running status of agreement or instruction are combined, A width directed acyclic graph is constituted, then using graph traversal algorithm, in recursive form, all agreement operating paths are traveled through.
On the basis of above-mentioned technical proposal, in step 5, target monitor builds debugger, the tune using system API Examination device is bundled in the process of test target, in real time the running status of monitoring test target, when mistake occurs in test target When, the debugger will read corresponding vulnerability information, while sending script transmission flow controller to.
On the basis of above-mentioned technical proposal, in step 6, the master controller is integrated with the corresponding webserver and entered Journey handles the input of user there is provided corresponding operation interface, while by the script information of script transmission flow controller, leak The corresponding informations such as information are shown in the user interface, and show the progress of bug excavation, the traffic conditions on backstage etc. in real time.
Distributed heterogeneous network hole method for digging of the present invention based on Fuzzing algorithms, available for distribution In heterogeneous network system, the test of corresponding software parses corresponding procotol by the way of automaticity is higher, carries out The modeling of agreement, then builds the directed acyclic graph for characterizing each path of agreement and state, so as to be carried out to whole agreement Comprehensive test and analysis, the bug excavation that high coverage rate can be effectively carried out to associated the Internet protocol is tested, Neng Goushi Now complete bug excavation test and corresponding effect are shown.Meanwhile, the present invention provides friendly human-computer interaction interface, Ke Yishi When transmit data script transmission content to operating personnel, excavate process, the corresponding bug excavation information such as leak description is supported simultaneously Data storage, operating personnel can be further analyzed to whole test process afterwards.
The invention has the advantages that:
1. the protocol analysis of test target is carried out using the higher method of automaticity;
2. providing significantly more efficient data presentation technique, so as to be preferably modeled to agreement, and corresponding mould is specified Paste field;
3. providing more comprehensive agreement operating path, the coverage rate and validity excavated to agreement are improved, reduction is surveyed The omission probability of examination;
4. providing friendly operation interface, facilitate the operation of operating personnel, reduce bug excavation enters gate threshold, and can To show corresponding information in real time, it is easy to user to check.
Brief description of the drawings
The present invention has drawings described below:
The existing online fuzzy measuring technology configuration diagrams of Fig. 1.
The workflow schematic diagram of Fig. 2 Fuzzing tests.
The schematic diagram of Fig. 3 the method for the invention.
The workflow schematic diagram of Fig. 4 protocol analysis.
The typical protocol path figure of Fig. 5 File Transfer Protocol.
Fig. 6 FTP application test frames.
The typical FTP instruction messages modelings of Fig. 7 mono-.
Embodiment
The present invention is described in further detail below in conjunction with accompanying drawing.
As shown in figure 3, the distributed heterogeneous network hole method for digging of the present invention based on Fuzzing algorithms, bag Include following steps:
Step 1, protocol analysis:The network packet of test target is captured, the procotol to test target is parsed, Determine agreement used in test target and corresponding agreement key message;
Step 2, protocol test script is built:According to the result of protocol analysis, agreement key message is comprehensively retouched State, different data formats is modeled accordingly, determine a variety of data formats and phase that agreement is showed The field information answered, is output as the information vector of corresponding protocol data, that is, generates protocol test script;
Step 3, protocol bug excavation path profile is built:According to protocol test script, by each running status of agreement or Person's instruction is combined, and is connected into directed acyclic graph, i.e. protocol bug excavation path profile, characterizes the operating path of protocol stack;
Step 4, user transmits control instruction by master controller to script transmission flow controller, control bug excavation Pause and operation;
Step 5, script transmission flow controller is according to protocol bug excavation path profile and corresponding control instruction, to test Target sends corresponding test script, and corresponding control instruction is sent to target monitor, and target monitor is come from while receiving Monitoring information, to judge whether to trigger corresponding leak;
Step 6, data display and storage:Master controller is deposited the vulnerability information of the test script of transmission and test Storage, and shown in the presentation of information page.
On the basis of above-mentioned technical proposal, the agreement key message described in step 1 includes protocol format, verification side Formula, each state of agreement and instruction.
In the present invention, when analyzing input matrix, protocol resolution module can capture the flow of network, carry out comprehensively certainly Dynamicization is analyzed, so that it is determined that agreement used in test target and corresponding data format, analyze corresponding data structure, enter And complete Protocol Modeling.In current fuzz testing technical scheme, in analysis input matrix the step, mainly using hand Work checks Protocol document or obtains the mode of test target interface document, carries out the parsing and modeling of agreement, this is for some Close source software and the test target of internal relevant information can not be obtained, can not often carry out effective Protocol Modeling and analysis.This The automatic analytic method proposed is invented, this obstacle is breached well.
Protocol analysis in the present invention is parsed using multisequencing progressive alignment algorithm to grabbing network packet, is led to Cross this automation parsing, can with the variable domain in identification protocol message and can not variable domain, textview field and binary field and point Every identifier field etc., and then whole protocal analysis is completed, foundation is provided for follow-up protocol test script modeling.
Protocol analysis comprises the following steps (as shown in Figure 4):
Firstly, it is necessary to obtain substantial amounts of network packet, this is the operation object based on dataflow analysis method;
Then, the network packet to crawl carries out preliminary treatment, and filtering invalid data, recomposing fragmented data, extraction are answered Use layer message;
Then, message analysis is carried out for the initial application layer message of acquisition, similar sequence of message is placed on one In group, it is convenient after format analysis when use, in message cluster module and classification message group module, utilize matching rule Then, application layer message before is divided into different packets;
Finally, in protocol format analysis module, analysis obtains message format, and the unit of analysis is acquisition in previous step Different types of message group, by multisequencing progressive alignment algorithm, analyze message protocol form, thus obtain construction survey The priori that case script on probation needs.
The multisequencing progressive alignment algorithm used in message protocol format analysis part, this programme, is in bioengineering Gene alignment algorithm on the basis of be improved.The main thought of progressive alignment algorithm is to use dynamic programming, iteratively Carry out pairwise comparison, be the comparison of two sequences during beginning, be gradually added into new sequence, until the sequence in need being compared Row all complete to compare.Pass through message classification, it is believed that the message in obtained each packet is same type.Message Length be the key factor for judging whether message similar.The present invention, will be every by the comparison sequence of message length determining sequence Message in individual packet is by being ranked up from being short to length, and progressive comparison is gradually completed whole from two most short starts of heading Individual comparison process.
On the basis of above-mentioned technical proposal, according to the result of protocol analysis, to protocol format, verification mode, agreement The agreement key message such as each state or instruction is comprehensively described, and is combined into specific data structure, completely Represent the agreement data packet format transmitted when being implemented.Present solution provides a variety of alternative data modes, including Static data, binary data, separator and character string etc., each of which data mode can choose whether excavating Cheng Dangzhong enters row variation, then by the way that each domain of above-mentioned data and protocal analysis is matched and made a variation setting, you can with Complete test script is built, corresponding protocol fields can on a large scale be made a variation, to lift the success of bug excavation Rate.
In existing technical scheme, according to the result of Protocol Modeling, starting the fuzz testing stage, be typically only capable to net Some state of network agreement or certain order are tested, it is impossible to which the running status to whole protocol stack carries out comprehensive, height The fuzz testing of spreadability.In the present invention, the relevant information of the target detection agreement provided according to test protocol script is right Each running status of agreement or a plurality of instruction are combined, and they are connected into a directed acyclic graph, characterize protocol stack Operating path, and then form complete bug excavation session, can to each operating path and command in combination of agreement Fuzz testing is carried out, so as to improve the validity of fuzz testing.Then the correlation of the figure is believed by specific data structure Breath, passes to script transmission flow controller, and then perform test.
Different agreements has different protocol status and the method for operation, and many application layer protocols have among running Obvious running status.By taking File Transfer Protocol as an example (as shown in Figure 5), typical ftp server can among initial login procedure, It is required that user inputs username and password, this process can be equivalent to send two respectively to user with USER and PASS keys Word field is the message of starting, and server parses the two messages, to complete login process.Complete corresponding preamble and operate it Afterwards, client can just send to server and ask, and to complete other operations, including set up file directory (MKD), delete file (DELE) operation such as, these operations are required further to be operated on the basis of the operation of its preamble is completed, and is built in system Among mold process, it is reflected as being necessary for these operation setting preamble courses of action, by this sequence of operations and protocol running state, It is modeled, just can obtains complete protocol running state figure, to characterize the entire run state of agreement, while ensures target Program can trouble-free operation on each different path.
The structure of protocol test script and the structure of protocol bug excavation path profile can be complete simulation test target exist Among running, the operating path of protocol stack, therefore among bug excavation process, all roads of test that can be completely Footpath, to ensure to accomplish high coverage rate.
On the basis of above-mentioned technical proposal, according to protocol bug excavation path profile and corresponding control instruction, script hair Send process controller to send corresponding test script to test target, send corresponding control instruction to target monitor, simultaneously The monitoring information from target monitor is received, to judge whether to trigger corresponding leak.
On the basis of above-mentioned technical proposal, for the difference of test target, to the monitoring means of test target there is also Difference, for running the software with complete operating system, test target monitor, mainly using corresponding system API structures Debugger is built, the debugger is bundled in the process of test target, in real time the running status of monitoring test target, once survey There is mistake in examination target, and it will read corresponding error message, while sending script transmission flow controller to.
In existing fuzz testing Technical Architecture, the preservation of test script data and vulnerability information is not often focused on.This Invention devises master controller on the basis of fuzz testing, with data storage and display function, test that can be to transmission Script data and vulnerability information are stored, and devise the friendly presentation of information page of comparison, so that tester uses; It can also be sent to script and process control module transmits corresponding control instruction, pause and operation of control system etc..
Corresponding Network Server Processes are integrated with master controller, it provides corresponding operation interface, processing user's Input, while the corresponding information such as script information, vulnerability information that script transmission flow controller is sent is included in user interface It is central, and it can also show the progress of bug excavation, the traffic conditions on backstage etc. in real time.
Traditional bug excavation method, automaticity is low, and threshold is higher, it is impossible to provide good to common attendant Operation interface, their mode of operation, typically using more order line mode of operation, complex operation has to operating personnel Higher professional standards requirement.Generally, among bug excavation process, user of service needs to be modeled related protocol, Then manual construction protocol model, and then send corresponding test script to test target, wherein test script is possibly can not be complete The operating path of all standing agreement, therefore also to be sent several times by the way of multiplexing, therefore it is inefficient.The present invention is adopted With this data structure of directed acyclic graph, with reference to corresponding ergodic algorithm, the complete trails of overlay protocol so that protocol test covers Lid rate is more comprehensive, more rich in efficiency.
It is application example of this programme among distributed heterogeneous network below.
For the technical program, using File Transfer Protocol as example is applied, File Transfer Protocol is a kind of FTP, is being divided It is widely used in cloth heterogeneous network, it is widely used for file backup, file is uploaded, file download, O&M record backup With download etc. field.
We carry out corresponding fuzz testing to ftp server here, and bug excavation device is operated in client, and its is continuous Send script to ftp server, and receive Process Debugging information from server end and network connection information, in real time prison The working condition of target detection software is controlled, leak is whether there is in target detection software so as to analyze, its working frame substantially As shown in Figure 6.
As shown in fig. 6, bug excavation device is believed in the script that client constantly sends generation to corresponding ftp server Breath, and the running status of ftp server is monitored by network monitoring agency and Message-based IPC agency, and then assess whether triggering Leak present in ftp server.For the modeling of File Transfer Protocol, a typical FTP instruction message can be modeled as Form shown in Fig. 7.Fig. 7 show one by the data lattice of the FTP instructions gone out constructed by technical solutions according to the invention Formula, is characterized in the instruction, can enter the data field and immutable data field and separator of row variation.
Wherein, to CMD, separator, the field of the immobilized substance such as character string and finishing control symbol, the present invention is It will not accordingly be made a variation, only to the 3rd field, this field is typically variable, and it, which is represented, in this example logs in Specific user name during ftp server, among actual application process, this field should be a word that can change Section, therefore among this programme, it will enter row variation to the field, build the script of enormous amount, and then be sent to FTP service Device.
For File Transfer Protocol, there is certain dependence between various orders, for example CWD, the order such as MKD must be Run after USER and PASS orders, and be separate between the order such as CWD and MKD, therefore we are needed according to this Working method between each order of kind agreement, builds the operating path of agreement, it is clear that this is a typical graphic structure, leads to Often complicated agreement may be mapped to as a directed acyclic graph.This programme is exactly to whole according to this directed acyclic graph Agreement is tested.
In addition, the technical program, is also integrated with the operation interface of close friend, and operating personnel can easily choose accordingly Network in test equipment, click start excavate button, the bug excavation device on backstage will start working, without other configurations With cumbersome operation.
The invention provides complete distributed heterogeneous network hole method for digging, including protocol analysis, Protocol Modeling side Method, protocol bug excavation path profile construction method, test target monitoring method and the presentation of information page.Agreement solution in the present invention Analysis method, captures substantial amounts of procotol message, the advantage of multisequencing progressive alignment algorithm is taken full advantage of, in network first A large amount of messages filtered accordingly, classify and handle, by the comparison of successive ignition, so as to analyze corresponding agreement lattice Formula, the structure for follow-up Protocol Modeling and protocol bug excavation path profile provides foundation.This also to be directed to some unknown associations The procotol bug excavation of view form becomes possibility.Secondly, protocol bug excavation path profile construction method so that test can be with Accomplish to carry out agreement complete modeling, corresponding fuzz testing can be carried out to specified field so that bug excavation is tested More comprehensively whole agreement can be tested, accomplish that coverage rate is higher, validity is stronger.
The content not being described in detail in this specification belongs to prior art known to professional and technical personnel in the field.

Claims (8)

1. the distributed heterogeneous network hole method for digging based on Fuzzing algorithms, it is characterised in that comprise the following steps:
Step 1, protocol analysis:The network packet of test target is captured, the procotol to test target is parsed, it is determined that Agreement used in test target and corresponding agreement key message;
Step 2, protocol test script is built:According to the result of protocol analysis, agreement key message is comprehensively described, it is right Different data formats are modeled accordingly, determine a variety of data formats and corresponding word that agreement showed Segment information, generates protocol test script;
Step 3, protocol bug excavation path profile is built:According to protocol test script, by each running status of agreement or refer to Order is combined, and is connected into protocol bug excavation path profile, characterizes the operating path of protocol stack;
Step 4, user transmits control instruction by master controller to script transmission flow controller, controls the pause of bug excavation And operation;
Step 5, script transmission flow controller is according to protocol bug excavation path profile and corresponding control instruction, to test target Corresponding test script is sent, corresponding control instruction is sent to target monitor, while receiving the prison from target monitor Measurement information, to judge whether to trigger corresponding leak;
Step 6, data display and storage:Master controller is stored the vulnerability information of the test script of transmission and test, and Shown in the presentation of information page.
2. the distributed heterogeneous network hole method for digging according to claim 1 based on Fuzzing algorithms, its feature exists In:Agreement key message described in step 1 includes protocol format, verification mode, each state of agreement and instruction.
3. the distributed heterogeneous network hole method for digging according to claim 1 based on Fuzzing algorithms, its feature exists In:Parsed in step 1 using multisequencing progressive alignment algorithm to grabbing network packet.
4. the distributed heterogeneous network hole method for digging according to claim 3 based on Fuzzing algorithms, its feature exists In:Protocol analysis specifically includes following steps described in step 1:
Step 11, network packet is obtained;
Step 12, the network packet to crawl carries out preliminary treatment, filtering invalid data, recomposing fragmented data, extraction application Layer message;
Step 13, message analysis is carried out for the application layer message of acquisition, similar sequence of message is placed in a group, side Just used after during format analysis, when carrying out message cluster and the classification of message group, using matched rule, by application layer message It is divided into different packets;
Step 14, when protocol format is analyzed, the different types of message group obtained in step 13 is analyzed, report is obtained Literary form, by multisequencing progressive alignment algorithm, analyzes agreement key message.
5. the distributed heterogeneous network hole method for digging according to claim 1 based on Fuzzing algorithms, its feature exists In:In step 2, the protocol test script includes protocol command form and version of an agreement is described.
6. the distributed heterogeneous network hole method for digging according to claim 1 based on Fuzzing algorithms, its feature exists In:In step 3, the protocol bug excavation path profile is directed acyclic graph, using graph traversal algorithm, in recursive form, time Go through all agreement operating paths.
7. the distributed heterogeneous network hole method for digging according to claim 1 based on Fuzzing algorithms, its feature exists In:In step 5, the target monitor builds debugger using system API, and the debugger is bundled in entering for test target Cheng Shang, in real time monitoring test target running status, when mistake occurs in test target, the debugger will be read accordingly Vulnerability information, while sending script transmission flow controller to.
8. the distributed heterogeneous network hole method for digging according to claim 1 based on Fuzzing algorithms, its feature exists In:In step 6, the master controller is integrated with corresponding Network Server Processes there is provided corresponding operation interface, handles user Input, while the script information and vulnerability information of script transmission flow controller are shown in the user interface, and in real time Display bug excavation progress and backstage traffic conditions.
CN201611235833.1A 2016-12-28 2016-12-28 Distributed heterogeneous network hole method for digging based on Fuzzing algorithms Pending CN107046526A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611235833.1A CN107046526A (en) 2016-12-28 2016-12-28 Distributed heterogeneous network hole method for digging based on Fuzzing algorithms

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611235833.1A CN107046526A (en) 2016-12-28 2016-12-28 Distributed heterogeneous network hole method for digging based on Fuzzing algorithms

Publications (1)

Publication Number Publication Date
CN107046526A true CN107046526A (en) 2017-08-15

Family

ID=59543630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611235833.1A Pending CN107046526A (en) 2016-12-28 2016-12-28 Distributed heterogeneous network hole method for digging based on Fuzzing algorithms

Country Status (1)

Country Link
CN (1) CN107046526A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108108625A (en) * 2017-12-29 2018-06-01 哈尔滨安天科技股份有限公司 Overflow vulnerability detection method, system and storage medium based on form isomery
CN108337266A (en) * 2018-03-07 2018-07-27 中国科学院信息工程研究所 A kind of efficient protocol client vulnerability mining method and system
CN108600195A (en) * 2018-04-04 2018-09-28 国家计算机网络与信息安全管理中心 A kind of quick reverse estimating method of industry control protocol format based on incremental learning
CN108737213A (en) * 2018-05-22 2018-11-02 中国电子科技集团公司第四十研究所 A kind of parallel big handling capacity Permeation Test System of height based on FPGA and method
CN109450731A (en) * 2018-11-09 2019-03-08 中国科学院长春光学精密机械与物理研究所 A kind of test data generating method of application layer communication protocol
CN109543417A (en) * 2018-11-26 2019-03-29 杭州安恒信息技术股份有限公司 A kind of bug excavation method and device based on Qemu platform
CN109660558A (en) * 2019-01-18 2019-04-19 中国电力科学研究院有限公司 IEC104 protocol bug excavation method based on protocol status figure traversal
CN109981563A (en) * 2019-01-23 2019-07-05 国家新闻出版广电总局广播电视规划院 A kind of automatic intelligent method for digging of radio and television key message infrastructure network security breaches
CN110232012A (en) * 2018-03-06 2019-09-13 国家计算机网络与信息安全管理中心 A kind of fuzz testing language protocol test script and testing engine based on xml
CN111628900A (en) * 2019-02-28 2020-09-04 西门子股份公司 Fuzzy test method and device based on network protocol and computer readable medium
CN111901327A (en) * 2020-07-21 2020-11-06 平安科技(深圳)有限公司 Cloud network vulnerability mining method and device, electronic equipment and medium
CN112398839A (en) * 2020-11-06 2021-02-23 中国科学院信息工程研究所 Industrial control vulnerability mining method and device
CN112653693A (en) * 2020-12-21 2021-04-13 哈尔滨工大天创电子有限公司 Industrial control protocol analysis method and device, terminal equipment and readable storage medium
CN112906011A (en) * 2021-05-07 2021-06-04 北京安普诺信息技术有限公司 Vulnerability discovery method, testing method, security testing method, related device and platform
CN113407945A (en) * 2021-06-18 2021-09-17 北京计算机技术及应用研究所 Man-machine cooperation based large-scale Fuzzing optimization system and method
CN113722717A (en) * 2021-07-21 2021-11-30 中国科学院信息工程研究所 Security vulnerability testing method, device, equipment and readable storage medium
CN113806202A (en) * 2020-06-11 2021-12-17 北京威努特技术有限公司 Vulnerability mining method and device and computer equipment
CN113872919A (en) * 2020-06-30 2021-12-31 华为技术有限公司 Vulnerability scanning method and device
CN114827306A (en) * 2022-03-15 2022-07-29 西安电子科技大学 Multi-source heterogeneous industrial protocol message analysis method, system, equipment and medium
CN115174194A (en) * 2022-06-30 2022-10-11 浙江极氪智能科技有限公司 System vulnerability mining method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104142888A (en) * 2014-07-14 2014-11-12 北京理工大学 Regularization state machine model design method with stateful protocol
US8997235B2 (en) * 2012-02-07 2015-03-31 Microsoft Technology Licensing, Llc Adaptive fuzzing system for web services
CN104796240A (en) * 2015-04-30 2015-07-22 北京理工大学 Fuzz testing system for stateful network protocol
CN105245403A (en) * 2015-10-27 2016-01-13 国网智能电网研究院 Power-grid industrial control protocol vulnerability mining system and method based on fuzzy test
CN105721255A (en) * 2016-04-14 2016-06-29 北京工业大学 Industrial control protocol vulnerability mining system based on fuzzy test

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8997235B2 (en) * 2012-02-07 2015-03-31 Microsoft Technology Licensing, Llc Adaptive fuzzing system for web services
CN104142888A (en) * 2014-07-14 2014-11-12 北京理工大学 Regularization state machine model design method with stateful protocol
CN104796240A (en) * 2015-04-30 2015-07-22 北京理工大学 Fuzz testing system for stateful network protocol
CN105245403A (en) * 2015-10-27 2016-01-13 国网智能电网研究院 Power-grid industrial control protocol vulnerability mining system and method based on fuzzy test
CN105721255A (en) * 2016-04-14 2016-06-29 北京工业大学 Industrial control protocol vulnerability mining system based on fuzzy test

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张赛丹: "基于Fuzzing算法的网络漏洞挖掘研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108108625A (en) * 2017-12-29 2018-06-01 哈尔滨安天科技股份有限公司 Overflow vulnerability detection method, system and storage medium based on form isomery
CN110232012A (en) * 2018-03-06 2019-09-13 国家计算机网络与信息安全管理中心 A kind of fuzz testing language protocol test script and testing engine based on xml
CN108337266A (en) * 2018-03-07 2018-07-27 中国科学院信息工程研究所 A kind of efficient protocol client vulnerability mining method and system
CN108600195A (en) * 2018-04-04 2018-09-28 国家计算机网络与信息安全管理中心 A kind of quick reverse estimating method of industry control protocol format based on incremental learning
CN108600195B (en) * 2018-04-04 2022-01-04 国家计算机网络与信息安全管理中心 Rapid industrial control protocol format reverse inference method based on incremental learning
CN108737213A (en) * 2018-05-22 2018-11-02 中国电子科技集团公司第四十研究所 A kind of parallel big handling capacity Permeation Test System of height based on FPGA and method
CN108737213B (en) * 2018-05-22 2020-06-09 中国电子科技集团公司第四十一研究所 High-parallelism and high-throughput penetration test system and method based on FPGA
CN109450731A (en) * 2018-11-09 2019-03-08 中国科学院长春光学精密机械与物理研究所 A kind of test data generating method of application layer communication protocol
CN109543417A (en) * 2018-11-26 2019-03-29 杭州安恒信息技术股份有限公司 A kind of bug excavation method and device based on Qemu platform
CN109660558A (en) * 2019-01-18 2019-04-19 中国电力科学研究院有限公司 IEC104 protocol bug excavation method based on protocol status figure traversal
CN109981563A (en) * 2019-01-23 2019-07-05 国家新闻出版广电总局广播电视规划院 A kind of automatic intelligent method for digging of radio and television key message infrastructure network security breaches
CN111628900A (en) * 2019-02-28 2020-09-04 西门子股份公司 Fuzzy test method and device based on network protocol and computer readable medium
CN111628900B (en) * 2019-02-28 2023-08-29 西门子股份公司 Fuzzy test method, device and computer readable medium based on network protocol
CN113806202B (en) * 2020-06-11 2024-01-26 北京威努特技术有限公司 Vulnerability mining method and device and computer equipment
CN113806202A (en) * 2020-06-11 2021-12-17 北京威努特技术有限公司 Vulnerability mining method and device and computer equipment
CN113872919A (en) * 2020-06-30 2021-12-31 华为技术有限公司 Vulnerability scanning method and device
CN113872919B (en) * 2020-06-30 2022-11-22 华为技术有限公司 Vulnerability scanning method and device
CN111901327A (en) * 2020-07-21 2020-11-06 平安科技(深圳)有限公司 Cloud network vulnerability mining method and device, electronic equipment and medium
CN112398839A (en) * 2020-11-06 2021-02-23 中国科学院信息工程研究所 Industrial control vulnerability mining method and device
CN112398839B (en) * 2020-11-06 2021-11-30 中国科学院信息工程研究所 Industrial control vulnerability mining method and device
CN112653693A (en) * 2020-12-21 2021-04-13 哈尔滨工大天创电子有限公司 Industrial control protocol analysis method and device, terminal equipment and readable storage medium
CN112906011A (en) * 2021-05-07 2021-06-04 北京安普诺信息技术有限公司 Vulnerability discovery method, testing method, security testing method, related device and platform
CN113407945B (en) * 2021-06-18 2023-08-22 北京计算机技术及应用研究所 Large-scale Fuzzing optimization system and method based on man-machine cooperation
CN113407945A (en) * 2021-06-18 2021-09-17 北京计算机技术及应用研究所 Man-machine cooperation based large-scale Fuzzing optimization system and method
CN113722717A (en) * 2021-07-21 2021-11-30 中国科学院信息工程研究所 Security vulnerability testing method, device, equipment and readable storage medium
CN113722717B (en) * 2021-07-21 2024-04-05 中国科学院信息工程研究所 Security vulnerability testing method, device, equipment and readable storage medium
CN114827306A (en) * 2022-03-15 2022-07-29 西安电子科技大学 Multi-source heterogeneous industrial protocol message analysis method, system, equipment and medium
CN114827306B (en) * 2022-03-15 2024-01-19 西安电子科技大学 Multi-source heterogeneous industrial protocol message analysis method, system, equipment and medium
CN115174194A (en) * 2022-06-30 2022-10-11 浙江极氪智能科技有限公司 System vulnerability mining method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107046526A (en) Distributed heterogeneous network hole method for digging based on Fuzzing algorithms
CN105068925B (en) Software safety defect finds system
CN105933268B (en) A kind of website back door detection method and device based on the analysis of full dose access log
CN109739755B (en) Fuzzy test system based on program tracking and mixed execution
CN101242279B (en) Automatic penetration testing system and method for WEB system
CN104601573B (en) A kind of Android platform URL accesses result verification method and device
CN101902367A (en) Method and device for producing test case
Verwer et al. Flexfringe: a passive automaton learning package
CN105391729A (en) Web loophole automatic mining method based on fuzzy test
CN111488577B (en) Model building method and risk assessment method and device based on artificial intelligence
CN105141647A (en) Method and system for detecting Web application
CN110598418A (en) Method and system for dynamically detecting vertical override based on IAST test tool
CN110968873A (en) System and method for automatic penetration test based on artificial intelligence
CN113158197B (en) SQL injection vulnerability detection method and system based on active IAST
Botella et al. Risk-based vulnerability testing using security test patterns
CN116383833A (en) Method and device for testing software program code, electronic equipment and storage medium
CN110460575A (en) One kind can be realized security audit functional network Security Situation Awareness Systems
Landauer et al. A framework for automatic labeling of log datasets from model-driven testbeds for HIDS evaluation
CN111124937B (en) Method and system for assisting in improving test case generation efficiency based on instrumentation function
CN111488586B (en) Automatic permeation testing system post-permeation method based on AI
CN103368762A (en) Testing method, system and device for big data comparison
Hao et al. Usage-based statistical testing of web applications
CN107463493A (en) A kind of test system and method for testing towards host antivirus software product
CN113836539A (en) Power engineering control system leak full-flow disposal system and method based on precise test
CN112433947A (en) Chaos engineering method and system based on network data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170815

RJ01 Rejection of invention patent application after publication