Research Article
A Research on Vulnerability Discovering for Router Protocols Based on Fuzzing
@INPROCEEDINGS{10.1109/ChinaCom.2012.6417484, author={Yuqing Zhang and Zhiqiang Wang and Qixu Liu}, title={A Research on Vulnerability Discovering for Router Protocols Based on Fuzzing}, proceedings={7th International Conference on Communications and Networking in China}, publisher={IEEE}, proceedings_a={CHINACOM}, year={2012}, month={9}, keywords={router security fuzzing tftcg protocol vulnerability discovering}, doi={10.1109/ChinaCom.2012.6417484} }
- Yuqing Zhang
Zhiqiang Wang
Qixu Liu
Year: 2012
A Research on Vulnerability Discovering for Router Protocols Based on Fuzzing
CHINACOM
IEEE
DOI: 10.1109/ChinaCom.2012.6417484
Abstract
How to discover router vulnerabilities effectively and automatically is a critical problem to ensure network and information security. Previous research on router security is mostly about the technology of exploiting known flaws of routers. Fuzzing is a famous automated vulnerability finding technology, however, traditional Fuzzing tools are designed for testing network applications or other software. These tools are not or partly not suitable for testing routers. This paper designs a framework of discovering router protocol vulnerabilities, and proposes a mathematical model Two-stage Fuzzing Test Cases Generator (TFTCG) that improves previous methods to generate test cases. We have developed a tool called RPFuzzer based on TFTCG. RPFuzzer monitors routers by sending normal packets, keeping watch on CPU utilization and checking system logs, which can detect DoS, router reboot and so on. RPFuzzer’debugger based on modified Dynamips, which can record register values when an exception occurs. Finally, we experiment on the SNMP protocol, find 8 vulnerabilities,of which there are five unreleased vulnerabilities. The experiment has proved the effectiveness of RPFuzzer.