The Detection Technology of LTE based Stratified Fuzz

  • Jun Yang
  • Haixia YangEmail author
  • Qinshu Xiao
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 2)


Fuzz test usually used in detecting network protocol vulnerabilities, Though that common fuzz test can cover as many as testing cases, its efficiency is relatively low. It may be spend many time to detect an aspect of a protocol. For this problem the paper put forward a more efficient method based on common fuzzing test. This method is applied for LTE protocol because it is raised against the features of LTE protocol. The paper in-depth studied the structure and process of GTP protocol, and designed stratified Fuzz testing process for the detection of GTP protocol to prove that the detection technology of LTE based stratified Fuzz is feasible and more efficient compared to common Fuzzing.


Detection Technology Bloom Filter General Packet Radio Service User Plane GPRS Tunneling Protocol 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    GPP. TS.33.401. V.12.9.0-2013. 3GPP System Architecture Evolution (SAE): Security Architecture (Release12)Google Scholar
  2. 2.
    GPP TS 129.060. General packet radio service (GPRS): GPRS tunneling Protocol (GTP) across the Gn and GP interface[s].2005Google Scholar
  3. 3.
    MurphyG. Whltehouse0. Attacks and COUntS measures in 2.5 and 3G cellular IP networks[R]. Cambride MA USA:@stake.Ine.,2004Google Scholar
  4. 4.
    Bavosa. A GPRS security threats and solution recommendations[R]. Sunnyvale CA USA: Juniper Network Inc.,2004.Google Scholar
  5. 5.
    GPP TSG-SA2, Security analysis for tunnel establishment[s], Nortel Networks July,2003.Google Scholar
  6. 6.
    Piro G, Baldo N, Miozzo M. An LTE module for the ns-3 network simulator[C]// Proceedings of the 4th International ICST Conference on Simulation Tools and TechniquesICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2011:415- 22.Google Scholar
  7. 7.
    Wang T, Wei T, Gu G, et al. Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution[J]. Acm Transactions on Information & System Security, 2011, 14(2):613-613.Google Scholar
  8. 8.
    Cheng H F, Zhang Y Q. Bluetooth OBEX Vulnerability Discovery Technique Based on Fuzzing[J]. Computer Engineering, 2008, 34(19):151-153.Google Scholar
  9. 9.
    Gtinter Schafer, Research Challenges in Security for Next Generation Mobile Networks, Workshop on Pioneering Advanced Mobile Privacy and Security(PAMPAS), Royal Holloway University of London, Egham, Surrey, United Kingdom. September 2002.Google Scholar
  10. 10.
    Andrei Broder, Michael Mitzenmacher. Network Applications of Bloom Filters: A Survey. Internet Math. Volume 1, Number 4 (2003), pp.485-509.Google Scholar
  11. 11.
    H.N.Hung, Y.B.Lin, “Connection failure detection mechanism of UMTS charging protocol,” IEEE Transactions on Wireless Communication, vol.5, NO.5, pp.1180-1186, 2006Google Scholar
  12. 12.
    Liu Li-Fang, Huo Hong-Wei, Wang Bao-Shu. PHGA-COFFEE:Aligning multiple sequences by parallel hybrid genetic algorithm. Chinese Journal of Computers, 2006, 29(5): 727-733(in Chinese)Google Scholar
  13. 13.
    Liu Qi-Xu, Zhang Yu-Qing. TFTP vulnerability exploiting technique based on Fuzzing. Computer Enfineering, 2007, 33(20):142-144(in Chinese)Google Scholar
  14. 14.
    Makam P. Security vulnerabilities in GPRS networks[R]. Hyder-abad: India Wipro Technologies, 2006.Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.School of Computer ScienceBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.National Engineering Laboratory for Mobile Network SecurityBeijingChina

Personalised recommendations