A Survey on the Development of Network Protocol Fuzzing Techniques

5Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Network protocols, as the communication rules among computer network devices, are the foundation for the normal operation of networks. However, security issues arising from design flaws and implementation vulnerabilities in network protocols pose significant risks to network operations and security. Network protocol fuzzing is an effective technique for discovering and mitigating security flaws in network protocols. It offers unparalleled advantages compared to other security analysis techniques thanks to the minimal requirement for prior knowledge of the target and low deployment complexity. Nevertheless, the randomness in test case generation, uncontrollable test coverage, and unstable testing efficiency introduce challenges in ensuring the controllability of the testing process and results. In order to comprehensively survey the development of network protocol fuzzing techniques and analyze their advantages and existing issues, in this paper, we categorized and summarized the protocol fuzzing and its related techniques based on the generation methods of test cases and testing conditions. Specifically, we overviewed the development trajectory and patterns of these techniques over the past two decades according to chronological order. Based on this analysis, we further predict the future directions of fuzzing techniques.

Cite

CITATION STYLE

APA

Zhang, Z., Zhang, H., Zhao, J., & Yin, Y. (2023, July 1). A Survey on the Development of Network Protocol Fuzzing Techniques. Electronics (Switzerland). Multidisciplinary Digital Publishing Institute (MDPI). https://doi.org/10.3390/electronics12132904

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free