Abstract
The current underutilization of IPv6 enabled services makes accesses to them very attractive because of higher availability and better response time, like the IPv6 specific services from Google and Youtube have recently got a lot of requests. In this paper, we describe a fuzzing framework for IPv6 protocols. Fuzzing is a process by which faults are injected in order to find vulnerabilities in implementations. Our paper describes a machine learning approach, that leverages reinforcement based fuzzing method. We describe a reinforcement learning algorithm to allow the framework to autonomically learn the best fuzzing mechanisms and to automatically test stability and reliability of IPv6.
Chapter PDF
Similar content being viewed by others
References
Abdelnur, H.J., State, R., Festor, O.: KiF: a stateful SIP fuzzer. In: IPTComm 2007: Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, pp. 47–56. ACM, New York (2007)
Aitel, D.: The Advantages of Block-Based Protocol Analysis for Security Testing. Immunity Inc. (February 2002), http://www.immunitysec.com/resources-papers.shtml
Cadar, C., Twohey, P., Ganesh, V., Engler, D.: EXE: Automatically Generating Inputs of Death Using Symbolic Execution. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), Virginia, USA (November 2006)
Comparetti, P.M., Wondracek, G., Kruegel, C., Kirda, E.: Prospex: Protocol specification extraction. In: IEEE Symposium on Security and Privacy, pp. 110–125 (2009)
Dowd, M., McDonald, J., Schuh, J.: The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison-Wesley Professional, Reading (2006)
Drewry, W., Ormandy, T.: Flayer: exposing application internals. In: WOOT 2007: Proceedings of the first USENIX workshop on Offensive Technologies, Berkeley, USA, pp. 1–9. USENIX Association (2007)
Driessens, K., Ramon, J., Gärtner, T.: Graph kernels and gaussian processes for relational reinforcement learning. Mach. Learn. 64(1-3), 91–119 (2006)
Godefroid, P., Kieźun, A., Levin, M.Y.: Grammar-based Whitebox Fuzzing. In: PLDI 2008: ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, Tucson, US (2008)
Hsu, Y., Shu, G., Lee, D.: A model-based approach to security flaw detection of network protocol implementations. In: IEEE International Conference on Network Protocols, ICNP 2008, October 2008, pp. 114–123 (2008)
Kaelbling, L.P., Littman, M.L., Moore, A.W.: Reinforcement learning: A survey. Journal of Artificial Intelligence Research 4, 237–285 (1996)
Karpilovsky, E., Gerber, A., Pei, D., Rexford, J., Shaikh, A.: Quantifying the extent of ipv6 deployment. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol. 5448, pp. 13–22. Springer, Heidelberg (2009)
Lee, D., Chen, D., Hao, R., Miller, R.E., Wu, J., Yin, X.: Network protocol system monitoring: a formal approach with passive testing. IEEE/ACM Trans. Netw. 14(2), 424–437 (2006)
Majumdar, R., Xu, R.-G.: Directed test generation using symbolic grammars. In: ESEC-FSE companion 2007: The 6th Joint Meeting on European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, pp. 553–556. ACM, New York (2007)
Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of unix utilities. Commun. ACM 33(12), 32–44 (1990)
Narten, T., Nordmark, E., Simpson, W., Soliman, H.: Neighbor Discovery for IP version 6 (IPv6). RFC 4861, Draft Standard (September 2007)
Newsome, J., Brumley, D., Song, D.X.: Vulnerability-specific execution filtering for exploit prevention on commodity software. In: NDSS (2006)
Sparks, S., Embleton, S., Cunningham, R., Zou, C.: Automated vulnerability analysis: Leveraging control flow for evolutionary input crafting. In: Twenty-Third Annual Computer Security Applications Conference, ACSAC 2007, December 2007, pp. 477–486 (2007)
Sutton, R.S., Barto, A.G.: Reinforcement learning i: Introduction (1998)
Vuagnoux, M.: Autodafé: an Act of Software Torture. In: Proceedings of the 22th Chaos Communication Congress, Berlin, pp. 47–58. Chaos Computer Club (2005)
Wang, Z., Yin, X., Wang, H., Wu, J.: Automatic testing of neighbor discovery protocol based on fsm and ttcn. In: The 2004 Joint Conference of the 10th Asia-Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceedings, Bejing, China, vol. 2, pp. 805–809. IEEE Computer Society Press, Los Alamitos (2004)
Zhang, Y., Li, Z.: Ipv6 conformance testing: Theory and practice. In: ITC 2004: Proceedings of the International Test Conference on International Test Conference, Washington, DC, USA, pp. 719–727. IEEE Computer Society Press, Los Alamitos (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 IFIP International Federation for Information Processing
About this paper
Cite this paper
Becker, S., Abdelnur, H., State, R., Engel, T. (2010). An Autonomic Testing Framework for IPv6 Configuration Protocols. In: Stiller, B., De Turck, F. (eds) Mechanisms for Autonomous Management of Networks and Services. AIMS 2010. Lecture Notes in Computer Science, vol 6155. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13986-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-13986-4_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13985-7
Online ISBN: 978-3-642-13986-4
eBook Packages: Computer ScienceComputer Science (R0)