Computer Science ›› 2022, Vol. 49 ›› Issue (5): 318-324.doi: 10.11896/jsjkx.210300281

• Information Security • Previous Articles     Next Articles

Testcase Filtering Method Based on QRNN for Network Protocol Fuzzing

HU Zhi-hao, PAN Zu-lie   

  1. College of Electronic Engineering,National University of Defense Technology,Hefei 230037,China
    Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation,Hefei 230037,China
  • Received:2021-03-29 Revised:2021-07-14 Online:2022-05-15 Published:2022-05-06
  • About author:HU Zhi-hao,born in 1997,postgraduate.His main research interests include network security and fuzzing test.
    PAN Zu-lie,born in 1976,Ph.D,professor.His main research interests include network security,vulnerability disco-very and computer science.
  • Supported by:
    National Key R & D Program of China(2017YFB0802900).

Abstract: At present,targets of network protocol fuzzing tend to be large protocol entities,and traditional testcase filtering me-thods are mainly based on the running status information of the test object.The larger the test object,the longer it takes to execute a single testcase.Therefore,in view of the problems of long invalid execution time and low efficiency in traditional testcase filtering methods for network protocol fuzzing,a testcase filtering method based on QRNN for network protocol fuzzing is proposed according to strong abilities of recurrent neural network models to process and predict sequence data.The method can automatically filter invalid testcases by learning structural characteristics of the network protocol,including the value range of fields and constraint relationships between fields,and reduce the number of testcases executed by the protocol entity.Experimental results show that,compared with traditional testcase filtering methods for network protocol fuzzing,the proposed method can effectively reduce the time cost of network protocol vulnerability discovery and dramatically improve the efficiency of network protocol fuzzing.

Key words: Deep learning, Fuzzing test, Network protocol, QRNN, Testcase filtering

CLC Number: 

  • TP393
[1]LI J,ZHAO B,ZHANG C.Fuzzing:asurvey[J].Cybersecurity,2018,1(1):1-13.
[2]COHEN M B,SNYDER J,ROTHERMEL G.Testing acrossconfigurations:implications for combinatorial testing[J].ACM SIGSOFT Software Engineering Notes,2006,31(6):1-9.
[3]LIANG H,PEI X,JIA X,et al.Fuzzing:State ofthe art[J].IEEE Transactions on Reliability,2018,67(3):1199-1218.
[4]PEACHTEC.Peach[EB/OL].(2017-10-06)[2021-04-17].http://www.peachfuzzer.com/products/peach-platform.
[5]Beyond Security.beSTORM[EB/OL].(2021-04-17)[2021-04-17].https://beyondsecurity.com/solutions/bestorm.html.
[6]PHAM V T,BÖHME M,ROYCHOUDHURY A.AFLNet:agreybox fuzzer for network protocols[C]//2020 IEEE 13th International Conference onSoftware Testing,Validation and Verification(ICST).IEEE,2020:460-465.
[7]LI M L,HUANG H,LU Y L.Test Case Generation Technology Based on Symbol Divideand Conquer Area for Vulnerability Mining[J].Netinfo Security,2020,20(5):39-46.
[8]GONG W,ZHANG G,ZHOU X.Learn to Accelerate Identif-ying New Test Cases in Fuzzing[C]//International Conference on Security,Pri-vacy and Anonymity in Computation,Communication and Storage.Cham:Springer,2017:298-307.
[9]KARAMCHETI S,MANN G,ROSENBERG D.ImprovingGrey-Box Fuzzing by Modeling Program Behavior[J].arXiv:1811.08973,2018.
[10]ZONG P,LV T,WANG D,et al.Fuzzguard:Filteringout un-reachable inputs in directed grey-box fuzzing through deep learning[C]//29th Security Symposium (USENIX).2020:2255-2269.
[11]ZHANG X,LI Z J.Surveyof Fuzz TestingTechnology[J].Computer Science,2016,43(5):1-8,26.
[12]JIANG Y G,CHEN X,LI J B,et al.A FuzzyTest Case Generation Method based on LSTM for S7 Protocol[J].Computer Engineering,2021,47(7):183-188.
[13]ZALEWSKI M.American fuzzy lop[EB/OL].(2017-11-05)[2021-04-17].https://github.com/mirrorer/afl.
[14]LCAMTUF.AFL fuzzing strategies[EB/OL].(2014-08-08)[2021-04-17].https://lcamtuf.blogspot.jp/2014/08/binary-fuzzing-strategies-what-works.html.
[15]SCHMIDHUBER J.Gradient Flow in RecurrentNets:the Difficulty of Learning Long-Term Dependencies[M]//Wiley-IEEE Press,2001.
[16]HOCHREITER S,SCHMIDHUBER J.Long Short-Term Me-mory[J].Neural Computation,1997,9(8):1735-1780.
[17]BRADBURY J,MERITY S,XIONG C,et al.Quasi-recu-rrent neural networks[J].arXiv:1611.01576,2016.
[18]LOU Y X,YUAN W H,PENG R Q.Speech EnhancementMethod Based on Quasi Recurrent Neural Network[J].Computer Engineering,2020,46(4):316-320.
[19]WANG Y,JIA P,LIU L,et al.A systematic reviewof fuzzingbased on machine learning techniques[J].PLoS ONE,2020,15(8):e0237749.
[20]QIU X P.Neural Networks and Deep Learning[M].Beijing:China Machine Press,2020.
[21]ZHOU Y H.Research on Network Protocol Vulnerability Mining Method Based on Deep Learning[D].Chengdu:University of Electronic Science and Technology of China,2020.
[22]XU L L,CHI D X.Machine learning classification strategy for imbalanced data sets[J].Computer Engineeringand Applications,2020,56(24):12-27.
[23]BIND 9[EB/OL].(2004-01-28)[2021-04-17].https://www.isc.org/bind/.
[1] XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171.
[2] RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207.
[3] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[4] SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177.
[5] WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293.
[6] HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329.
[7] JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335.
[8] HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163.
[9] ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169.
[10] SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235.
[11] HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78.
[12] CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126.
[13] LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11.
[14] SUN Fu-quan, CUI Zhi-qing, ZOU Peng, ZHANG Kun. Brain Tumor Segmentation Algorithm Based on Multi-scale Features [J]. Computer Science, 2022, 49(6A): 12-16.
[15] KANG Yan, XU Yu-long, KOU Yong-qi, XIE Si-yu, YANG Xue-kun, LI Hao. Drug-Drug Interaction Prediction Based on Transformer and LSTM [J]. Computer Science, 2022, 49(6A): 17-21.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!