Font Size: a A A

Research On Security Defect Detection Technology Of LTE Core Network Protocol

Posted on:2022-06-17Degree:MasterType:Thesis
Country:ChinaCandidate:G B WangFull Text:PDF
GTID:2518306338466504Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of LTE networks and their global deployment,the security of LTE networks has attracted more and more attention.In recent years,more and more LTE network security vulnerabilities have been discovered,and these security vulnerabilities will seriously affect people's normal lives.The LTE core network is one of the important components of the LTE network.Most of the functions of the LTE network are implemented by the LTE core network,and the security of the core network protocol directly determines the security performance of the core network.Therefore,this article will study the LTE core network protocol security detection technology.The main contents of this article are as follows:1.Aiming at the shortcomings of low efficiency of traditional fuzzing technology,a field screening strategy is proposed.Through preliminary screening of the protocol field set,only the remaining fields are tested,which greatly improves the efficiency of fuzzing testing;generation for traditional fuzzing testing Due to the inefficiency of the test samples,a data packet repair strategy is proposed,which allows the test samples to cover more execution paths of the target program through the least necessary repairs to the test samples,thereby discovering more potential vulnerabilities;Aiming at the shortcomings of traditional fuzzing technology that does not consider the state transition of the protocol,a full-state traversal strategy is proposed.By testing all states along the protocol state machine,more potential security issues can be discovered.2.Combining the three optimization strategies proposed above,the LTE core network protocol security defect detection system is designed and implemented.The system mainly includes a mutation module,data packet transmission,field screening module,data packet repair module,state transfer module,and monitoring module And the log module.The GTPv2 and Diameter protocols were tested on the LTE simulation environment OAI.3.Finally,statistics and analysis of the experimental results have found some loopholes in the implementation of the GTPv2 and Diameter protocols.At the same time,the results of the three optimization strategies proposed in this article and the traditional strategies are compared.
Keywords/Search Tags:LTE-core-network, fuzzing-test, field-filter, data-packet-repair, protocol-state-machine
PDF Full Text Request
Related items