[1]李涛,胡爱群,高尚.基于BB-BM算法的网络协议内容符合性测试方法[J].东南大学学报(自然科学版),2015,45(6):1027-1031.[doi:10.3969/j.issn.1001-0505.2015.06.001]
 Li Tao,Hu Aiqun,Gao Shang.Context consistency test method for network protocol based on BB-BM algorithm[J].Journal of Southeast University (Natural Science Edition),2015,45(6):1027-1031.[doi:10.3969/j.issn.1001-0505.2015.06.001]
点击复制

基于BB-BM算法的网络协议内容符合性测试方法()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
45
期数:
2015年第6期
页码:
1027-1031
栏目:
信息与通信工程
出版日期:
2015-11-20

文章信息/Info

Title:
Context consistency test method for network protocol based on BB-BM algorithm
作者:
李涛1胡爱群1高尚2
1东南大学信息科学与工程学院, 南京210096; 2香港理工大学电子计算学系, 香港999077
Author(s):
Li Tao1 Hu Aiqun1 Gao Shang2
1School of Information Science and Engineering, Southeast University, Nanjing 210096, China
2Department of Computing, Hong Kong Polytechnic University, Hong Kong 999077, China
关键词:
内容符合性 模式识别 BM算法 协议安全
Keywords:
context consistency pattern recognition BM(Boyer Moore)algorithm protocol security
分类号:
TN918.91
DOI:
10.3969/j.issn.1001-0505.2015.06.001
摘要:
为了检测网络通信协议的安全性,使用高效的模式识别方法对协议内容进行符合性测试.采用黑盒测试的方法,在检测端将协议服务器和检测模块分离,设计了协议安全性测试框架和测试流程;提出了以字节块为单位、分块计算摘要值再进行匹配的BB-BM算法.实验结果表明,使用该方法能够对网络协议按照内容种类划分值域空间,通过匹配算法进行符合性测试.在进行模式匹配时通过分块处理减少了模式串和目标串数量,从而导致跳跃距离增加,匹配次数减少,检测性能在最优和最差测试状态下较现有检测方法分别提高了20%和80%.在该测试框架下,以字节块为单位进行匹配有效提升了检测效率,适用于对字段格式固定的网络协议进行内容符合性测试.
Abstract:
In order to check the security of network communication protocols, the efficient pattern recognition method is used to test protocols’ context consistency. Testing framework and process for protocol security are designed based on the black testing method with the testing part being divided into the protocol server and the testing module. The BB-BM(block based Boyer Moore)algorithm is proposed, in which the words block is used as unit and matching blocks is carried out after the calculation of digests. The experimental results show that the proposed system can divide the value space of network protocol based on the context type. The consistency test is carried out by the recognition algorithm. The number of pattern strings and target strings decreases by the block division process during the pattern matching, and correspondingly the skip distance increases and the times of recognition decrease. Compared with the existing matching methods, the testing performance of the proposed method increases by 20% and 80% under the best and worst testing conditions, respectively. In this system, the testing efficiency is effectively improved by using words block, which is suitable for context consistency tests of network protocol with fixed field format.

参考文献/References:

[1] Heckel R, Mariani L. Automatic conformance testing of web services[J]. FASE, 2005, 3442: 34-48.
[2] 冯登国, 范红. 安全协议形式化分析理论与方法研究综述[J]. 中国科学院研究生院学报, 2003, 20(4): 389-406.
  Feng Dengguo, Fan Hong. Survey on theories and methods of formal analyses for security protocols [J]. Journal of the Graduate School of the Chinese Academy of Sciences, 2003, 20(4): 389-406.(in Chinese)
[3] Chen L, Wang W. An improved NSSK protocol and its security analysis based on logic approach [C]//International Conference on Communications, Circuits and Systems. Xiamen, China, 2008: 772-775.
[4] Lecroq T. Fast exact string matching algorithms [J]. Information Processing Letters, 2007, 102(6): 229-235.
[5] Cook S A. The complexity of theorem-proving procedures [C]//Third Annual ACM Symposium on Theory of Computing. New York, USA, 1971: 151-158.
[6] Sunday D M. A very fast substring search algorithm [J]. Communications of the ACM, 1990, 33(8): 132-142.
[7] Cho S, Na J C, Park K, et al. Fast order-preserving pattern matching [J]. Combinatorial Optimization and Applications, 2013, 8287: 295-305.
[8] Rytter W. On maximal suffixes and constant-space linear-time versions of KMP algorithm [J]. Theoretical Computer Science, 2003, 299(1/2/3): 763-774.
[9] 毕智超. 字符串模式匹配算法的研究及改进 [J]. 电子测试, 2013(20): 64-65.
  Bi Zhichao. The research of improved matching algorithm of string pattern [J]. Electronic Test, 2013(20): 64-65.(in Chinese)
[10] Fu Y, Kone O. Security and robustness by protocol testing [J]. IEEE Systems Journal, 2014, 8(3): 699-707.

相似文献/References:

[1]袁浩,薛澄歧,卢章平.工业产品数字化模型的检索方法[J].东南大学学报(自然科学版),2006,36(3):397.[doi:10.3969/j.issn.1001-0505.2006.03.013]
 Yuan Hao,Xue Chengqi,Lu Zhangping.Digital model retrieval for industrial products[J].Journal of Southeast University (Natural Science Edition),2006,36(6):397.[doi:10.3969/j.issn.1001-0505.2006.03.013]
[2]刘春林,何建敏.神经网络用于模式识别分类的改进算法[J].东南大学学报(自然科学版),1999,29(1):20.[doi:10.3969/j.issn.1001-0505.1999.01.004]
 Liu Chunlin,He jianmin.An Improved ANN Algorithm for Pattern Recognition[J].Journal of Southeast University (Natural Science Edition),1999,29(6):20.[doi:10.3969/j.issn.1001-0505.1999.01.004]
[3]程力,蔡体菁.基于模式识别神经网络的重力匹配算法[J].东南大学学报(自然科学版),2007,37(5):839.[doi:10.3969/j.issn.1001-0505.2007.05.020]
 Cheng Li,Cai Tijing.Gravity matching algorithm based on pattern recognition neural network[J].Journal of Southeast University (Natural Science Edition),2007,37(6):839.[doi:10.3969/j.issn.1001-0505.2007.05.020]
[4]金世俊,黄惟一.基于多元统计分析的触觉图象模式识别[J].东南大学学报(自然科学版),1996,26(5):95.[doi:10.3969/j.issn.1001-0505.1996.05.018]
 Jin Shijun,Huang Weiyi.Tactile Image Pattern Recognition Based on Multivariate Statistical Analysis[J].Journal of Southeast University (Natural Science Edition),1996,26(6):95.[doi:10.3969/j.issn.1001-0505.1996.05.018]

备注/Memo

备注/Memo:
收稿日期: 2015-04-23.
作者简介: 李涛(1984—),男,博士, 讲师,lit@seu.edu.cn.
基金项目: 国家发改委信息安全专项基金资助项目、国家重点基础研究发展计划(973计划)资助项目(2013CB338003).
引用本文: 李涛,胡爱群,高尚.基于BB-BM算法的网络协议内容符合性测试方法[J].东南大学学报:自然科学版,2015,45(6):1027-1031. [doi:10.3969/j.issn.1001-0505.2015.06.001]
更新日期/Last Update: 2015-11-20