DocumentCode :
2975661
Title :
Fuzzing test data generation based on message matrix perturbation with keyword reference
Author :
Gu, Shijia ; Song, Yueyang ; Zhao, Xin ; Li, Weihai
Author_Institution :
Sch. of Electron. Eng., Beijing Univ. of Posts & Telecommun., Beijing, China
fYear :
2011
fDate :
7-10 Nov. 2011
Firstpage :
1115
Lastpage :
1120
Abstract :
Network protocol fuzzing tries to test the robustness of a protocol implementation through exploring the infinite amount of possible anomalous inputs to find the tests that cause invalid behaviors. Therefore, protocol fuzzing is regarded as security testing, since it is essential to prove robustness in networks. Although many good practices have been done to improve protocol fuzzing, problems in automated test case generation are still unsolved. Traditional methods using formal language and protocol specification have evident defects, especially in close networks. In order to provide useful references for test data generation, protocol reverse engineering becomes a suitable solution. But approaches adopted during the last decades cost much in computational complexity and time consumption. To break through these limitations, this paper proposes a novel message matrix perturbing mode to generate test case through data mutation for application layer protocol. It is established on the basis of the mapping relationship according to ASCII code. After the conversion from a protocol message to an integer matrix, meta-perturbations can be conducted to generate test data in all syntax levels, which preserves the flexibility in complex mutating combinations. Additionally, a new statistical keyword extracting technique with priority recursive splitting pattern is introduced to provide useful information for intelligent data mutation. Finally, we evaluate the method on HTTP request message. With the transformed message matrix and corresponding keyword reference, test cases examples for protocol fuzzing are generated through perturbing process with the combination of meta-operations. Fairly good outcomes are achieved which illustrate the feasibility and efficiency of the work in this paper.
Keywords :
computational complexity; computer network security; formal languages; fuzzy set theory; matrix algebra; reverse engineering; statistical analysis; transport protocols; HTTP request message; application layer protocol; automated test case generation; computational complexity; data mutation; formal language; integer matrix; keyword reference; message matrix perturbation; meta-perturbations; network protocol fuzzing; protocol reverse engineering; protocol specification; recursive splitting pattern; security testing; statistical keyword extracting technique; test data generation fuzzing; Data mining; Particle separators; Protocols; Robustness; Security; Syntactics; Testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011
Conference_Location :
Baltimore, MD
ISSN :
2155-7578
Print_ISBN :
978-1-4673-0079-7
Type :
conf
DOI :
10.1109/MILCOM.2011.6127448
Filename :
6127448
Link To Document :
بازگشت