《计算机应用研究》|Application Research of Computers

基于有限状态机的网络协议状态机制检测方法

FSM-based method for detecting state mechanism of protocol

免费全文下载 (已被下载 次)  
获取PDF全文
作者 潘准洋,刘彩霞,刘树新
机构 国家数字交换系统工程技术研究中心,郑州 450002
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2015)04-1188-05
DOI 10.3969/j.issn.1001-3695.2015.04.054
摘要 进行网络稳定性测试时,对网络协议状态机制进行检测可以有效提高测试的全面性。基于有限状态机思想提出了一种协议状态机制检测方法。建立待测协议特定消息发送实体的有限状态机模型,确定输入集合;测试并监测实体的状态转移情况,生成状态转移图;根据状态转移图判定该消息的状态机制,确定有状态协议消息的触发条件,对消息进行归纳分类实现协议状态机制的判定。搭建实验环境,验证了该方法的有效性。
关键词 网络稳定性;有限状态机;协议状态机制;状态转移图
基金项目 国家“863”计划资助项目(2011AA010604,2011AA010605)
本文URL http://www.arocmag.com/article/01-2015-04-054.html
英文标题 FSM-based method for detecting state mechanism of protocol
作者英文名 PAN Zhun-yang, LIU Cai-xia, LIU Shu-xin
机构英文名 National Digital Switching System Engineering & Technological Research Center, Zhenzhou 450002, China
英文摘要 Detecting the state mechanism of protocol can effectively improve the test comprehensiveness when testing the stability of network.This paper proposed a detection method of the state mechanism of protocol based on finite state machine.First, this method established an FSM model of certain message sending entity of testing protocol and determined the input set.Second, during the test, it monitored state transitions of sending entity and generated a state transition diagram.Finally, it determined the state mechanism of protocol message and defined trigger conditions of stateful message according to the state transition diagram.It determined the state mechanism of protocol after summarizing and classifying the tested messages.This paper built a lab environment to test and verify the effectiveness of this method.
英文关键词 network stability; finite state machine(FSM); state mechanism of protocol; state transition diagram
参考文献 查看稿件参考文献
  [1] MOFFETT Y, DINGEL J, BEAULIEU A. Verifying protocol conformance using software model checking for the model-driven development of embedded systems[J] . IEEE Trans on Software Engineering, 2013, 39(9):1307-1325.
[2] ARMANDO A, BASIN D, BOUALLAGUI M, et al. The AVISS security protocol analysis tool[C] //Proc of the 14th International Conference on Computer Aided Verification. 2002:349-354.
[3] FENG Ze-bo, WU Xiao-ping, MA Liang-li, et al. Establishing the security foundations for network protocol design[C] //Proc of the 14th International Conference on Communication Technology. 2012:789-793.
[4] 刘豫, 王明华, 苏璞睿, 等. 基于动态污点分析的恶意代码通信协议逆向分析方法[J] . 电子学报, 2012, 40(4):661-668.
[5] BEKRAR S, BEKRAR C, GROZ R, et al. A taint based approach for smart fuzzing[C] //Proc of the 5th IEEE International Conference on Software Testing, Verification and Validation. 2012:818-825. [6] GANESH V, LEEK T, RINARD M. Taint-based directed whitebox fuzzing[C] //Proc of the 31st IEEE International Conference on Software Engineering. 2009:474-484.
[7] 李伟明, 张爱芳, 刘建财. 网络协议的自动化模糊测试漏洞挖掘方法[J] . 计算机学报, 2011, 34(2):242-255.
[8] WANG Zhi-qiang, ZHANG Yu-qing, LIU Qi-xu. A research on vulnerability discovering for router protocols based on fuzzing[C] //Proc of the 7th International ICST Conference on Communications and Networking in China. 2012:245-250.
[9] ANTUNES J, NEVES N, CORREIA M, et al. Vulnerability discovery with attack injection[J] . IEEE Trans on Software Engineering, 2010, 36(3):357-370.
[10] 吴世忠. 信息安全漏洞分析回顾与展望[J] . 清华大学学报:自然科学版, 2009, 49(2):2065-2072.
[11] KRAMER M, BADER S, OELMANN B. Implementing wireless sensor network applications using hierarchical finite state machines[C] //Proc of the 10th IEEE International Conference on Networking, Sensing and Control. 2013:124-129.
[12] 张炜. 基于状态机模型的协议被动测试研究[D] . 合肥:中国科学技术大学, 2007.
[13] 邓文达. 基于有限状态机协议分析模型的入侵检测系统[J] . 自动化技术与应用, 2006, 25(6):48-50.
[14] DOROFEEVA R, EL-FAKIH K, MAAG S, et al. FSM-based conformance testing methods:a survey annotated with experimental evaluation[J] . Information and Software Technology, 2010, 52(12):1286-1297.
[15] SOEWITO B, VESPA L, MAHAJAN A, et al. Self-addressable memory-based FSM:a scalable intrusion detection engine[J] . IEEE Network, 2009, 23(1):14-21.
[16] CORICI M, VINGARZAN D, MAGEDANZ T. 3GPP evolved packet core:the mass wireless broadband all-IP architecture[C] //Proc of World Telecommunications Congress. 2010:1-6.
[17] 3GPP TS 23. 401 v10. 7. 0, general packet radio service(GPRS) enhancements for evolved universal terrestrial radio access network (E-UTRAN) access[S] . [S. l. ] :3GPP, 2012.
收稿日期 2014/4/29
修回日期 2014/6/12
页码 1188-1192,1206
中图分类号 TP393.04
文献标志码 A