Abstract
The search for errors and vulnerabilities in operating systems, implementations of network protocols, and software products is an important task in information security. Fuzzing is currently one of the most popular approaches to searching for vulnerabilities. It can provide the highest degree of automation compared to other approaches and, thus, it is highly popular. The main disadvantage of fuzzing is the time of searching for vulnerabilities. This paper suggests architecture of the network protocol fuzzing system based on using x86 multiprocessor servers and virtualization technologies; it provides high system scalability and a capability of parallel fuzzing, which allows one to significantly reduce the time of searching for vulnerabilities.
Similar content being viewed by others
References
Stepanova, T. V., FSM models of adaptive behavior of a multi-agent system to counter distributed security threats in the Internet, Probl. Inf. Bezop., Komp. Sist., 2012, no. 3, pp. 46–52.
Zegzhda, D.P. and Stepanova, T. V., Sustaining the security of a distributed protection system using an adaptively changing management structure based on a random graph, Inf. Obraz. Nauki, 2012, no. 4 (16), pp. 64–73.
Pechenkin, A.I. and Lavrova, D.S., Modelling of high-speed parallel processing of network traffic on a multicluster, Probl. Inf. Bezop., Komp. Sist., 2012, no. 4, pp. 33–39.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © A.I. Pechenkin, A.V. Nikolskiy, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Pechenkin, A.I., Nikolskiy, A.V. Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster. Aut. Control Comp. Sci. 49, 758–765 (2015). https://doi.org/10.3103/S0146411615080313
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080313