Abstract
Fuzz test usually used in detecting network protocol vulnerabilities, Though that common fuzz test can cover as many as testing cases, its efficiency is relatively low. It may be spend many time to detect an aspect of a protocol. For this problem the paper put forward a more efficient method based on common fuzzing test. This method is applied for LTE protocol because it is raised against the features of LTE protocol. The paper in-depth studied the structure and process of GTP protocol, and designed stratified Fuzz testing process for the detection of GTP protocol to prove that the detection technology of LTE based stratified Fuzz is feasible and more efficient compared to common Fuzzing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Reference
GPP. TS.33.401. V.12.9.0-2013. 3GPP System Architecture Evolution (SAE): Security Architecture (Release12)
GPP TS 129.060. General packet radio service (GPRS): GPRS tunneling Protocol (GTP) across the Gn and GP interface[s].2005
MurphyG. Whltehouse0. Attacks and COUntS measures in 2.5 and 3G cellular IP networks[R]. Cambride MA USA:@stake.Ine.,2004
Bavosa. A GPRS security threats and solution recommendations[R]. Sunnyvale CA USA: Juniper Network Inc.,2004.
GPP TSG-SA2, Security analysis for tunnel establishment[s], Nortel Networks July,2003.
Piro G, Baldo N, Miozzo M. An LTE module for the ns-3 network simulator[C]// Proceedings of the 4th International ICST Conference on Simulation Tools and TechniquesICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2011:415- 22.
Wang T, Wei T, Gu G, et al. Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution[J]. Acm Transactions on Information & System Security, 2011, 14(2):613-613.
Cheng H F, Zhang Y Q. Bluetooth OBEX Vulnerability Discovery Technique Based on Fuzzing[J]. Computer Engineering, 2008, 34(19):151-153.
Gtinter Schafer, Research Challenges in Security for Next Generation Mobile Networks, Workshop on Pioneering Advanced Mobile Privacy and Security(PAMPAS), Royal Holloway University of London, Egham, Surrey, United Kingdom. September 2002.
Andrei Broder, Michael Mitzenmacher. Network Applications of Bloom Filters: A Survey. Internet Math. Volume 1, Number 4 (2003), pp.485-509.
H.N.Hung, Y.B.Lin, “Connection failure detection mechanism of UMTS charging protocol,” IEEE Transactions on Wireless Communication, vol.5, NO.5, pp.1180-1186, 2006
Liu Li-Fang, Huo Hong-Wei, Wang Bao-Shu. PHGA-COFFEE:Aligning multiple sequences by parallel hybrid genetic algorithm. Chinese Journal of Computers, 2006, 29(5): 727-733(in Chinese)
Liu Qi-Xu, Zhang Yu-Qing. TFTP vulnerability exploiting technique based on Fuzzing. Computer Enfineering, 2007, 33(20):142-144(in Chinese)
Makam P. Security vulnerabilities in GPRS networks[R]. Hyder-abad: India Wipro Technologies, 2006.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Yang, J., Yang, H., Xiao, Q. (2017). The Detection Technology of LTE based Stratified Fuzz. In: Barolli, L., Xhafa, F., Yim, K. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 2. Springer, Cham. https://doi.org/10.1007/978-3-319-49106-6_39
Download citation
DOI: https://doi.org/10.1007/978-3-319-49106-6_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49105-9
Online ISBN: 978-3-319-49106-6
eBook Packages: EngineeringEngineering (R0)