Wei, Zhiqiang;
Wei, Xijia;
Zhao, Xinghua;
Hu, Zongtang;
Xu, Chu;
(2024)
SGANFuzz: A Deep Learning-Based MQTT Fuzzing Method Using Generative Adversarial Networks.
IEEE Access
, 12
pp. 27210-27224.
10.1109/ACCESS.2024.3365712.
Preview |
Text
Wei_A Deep Learning-Based MQTT Fuzzing Method Using Generative Adversarial Networks_VoR.pdf - Published Version Download (2MB) | Preview |
Abstract
As the Internet of Things (IoT) industry grows, the risk of network protocol security threats has also increased. One protocol that has come under scrutiny for its security vulnerabilities is MQTT (Message Queuing Telemetry Transport), which is widely used. To address this issue, an automated execution program called fuzz has been developed to verify the security of MQTT brokers. This program is provided with various random and unexpected input data and monitored for different responses, such as acknowledgments, crashes, failures, or memory leaks. To generate a significant number of realistic MQTT protocols, we have proposed a Generative Adversarial Networks (GAN)-based protocol fuzzer called SGANFuzz. Our experimental results show that SGANFuzz has successfully detected 6 vulnerabilities among 7 MQTT implementations, including 3 CVE bugs. Compared to the state-of-the-art fuzzing tools, SGANFuzz has proven to be the most efficient fuzzing tool in terms of vulnerability detection and has expanded the feedback coverage by receiving more unique network responses from MQTT brokers.
Type: | Article |
---|---|
Title: | SGANFuzz: A Deep Learning-Based MQTT Fuzzing Method Using Generative Adversarial Networks |
Open access status: | An open access version is available from UCL Discovery |
DOI: | 10.1109/ACCESS.2024.3365712 |
Publisher version: | http://dx.doi.org/10.1109/access.2024.3365712 |
Language: | English |
Additional information: | Copyright © 2024 The Authors. This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License. For more information, see https://creativecommons.org/licenses/by-nc-nd/4.0/. |
Keywords: | MQTT, fuzz test, generative adversarial networks, time-series models, transformer, vulnerability detection |
UCL classification: | UCL UCL > Provost and Vice Provost Offices > UCL BEAMS UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science UCL > Provost and Vice Provost Offices > UCL BEAMS > Faculty of Engineering Science > Dept of Computer Science |
URI: | https://discovery.ucl.ac.uk/id/eprint/10188977 |
Archive Staff Only
View Item |