Title : 
Vulnerability mining for network protocols based on fuzzing
         
        
            Author : 
Sai-Dan Zhang ; Lu-yong Zhang
         
        
            Author_Institution : 
Key Lab. of Universal Wireless Commun., Beijing Univ. of Posts & Telecommun., Beijing, China
         
        
        
        
        
        
            Abstract : 
With the development of the network, internet security is becoming a hot research topic. The vulnerabilities existed in protocol implementations may be exploited by malicious attackers and cause serious problems. So it is necessary to do research in the vulnerability mining of network protocol. This paper presents an efficient approach for detecting the flaws of network protocols based on fuzzing. A fuzzer is built by extending an intelligent tool-Sulley, aiming to test the FTP and modify its weaknesses which are unable to solve the loop structure. Then, we apply the way to three FTP servers. The results show that the approach can easily find vulnerabilities of protocol implementation.
         
        
            Keywords : 
Internet; computer network security; data mining; transport protocols; Internet security; fuzzing; intelligent tool-Sulley; malicious attackers; network protocols; vulnerability mining; Computer crashes; Force; Monitoring; Protocols; Security; Servers; Testing; Sulley; fuzzing; vulnerability mining;
         
        
        
        
            Conference_Titel : 
Systems and Informatics (ICSAI), 2014 2nd International Conference on
         
        
            Conference_Location : 
Shanghai
         
        
            Print_ISBN : 
978-1-4799-5457-5
         
        
        
            DOI : 
10.1109/ICSAI.2014.7009365