Network Computer Security Hidden Dangers and Vulnerability Mining Technology
Network Computer Security Hidden Dangers and Vulnerability Mining Technology
Chao Wang*, Tianyu Ren, Qun Li, Xiaohu Wang, Guangxin Guo, Jiahan Dong
State Grid Beijing Electric Power Research Institute, Beijing 100075, China
1. Introduction
The advent of the network society has brought opportunities for global development. The use of network
technology has changed people's production methods, lifestyles, and concepts, greatly promoted the
development of human society and the progress of human civilization, and brought people into a new
era; the construction of network systems in all fields Gradually become indispensable content. Imperfect
infrastructure: The network is the soul of important strategic resources, decision resources, and social
governance battlefields. Network level has become an important indicator of the level of national
modernization and overall national strength. signature. The state has proposed to actively promote the
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd 1
CCCIS2019 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 750 (2020) 012155 doi:10.1088/1757-899X/750/1/012155
national economic and social informatization, and has made the important decision of “ promoting
industrialization, maximizing the use of latecomer advantages, and realizing the informatization of the
rapid development of social productive forces.” The 16th National Congress of the Communist Party
of China proposed: “Promote industrialization, promote industrialization, promote informatization,
give priority to the development of the information industry, widely use information technology in the
economic and social fields, and advocate informationization. ” Clarify the path and information of
China's economic development New historical mission of the industry. The construction and application
of information network systems will indeed become the focus of national development in the new
century. However, while enjoying the benefits brought by the network, people also face the severe test
of network security. Information security is closely related to national security, national prosperity, and
the consequences of war. Without cyber security, there is no real national security guarantee, nor is there
any real political, military, or economic security guarantee.
Faced with the strengthening of economic globalization, we must not only see the opportunities it
brings, but also the challenges it brings [1]. With the continuous development of computer network
technology, global informatization has become the main trend of human development. Computer
networks are widely used in defense, military, finance, communications, securities, commerce, and daily
life, which also reflects the importance of technology. However, due to the diversity of connection forms,
the uneven distribution of terminals, the openness and interconnection of the network, computer
networks are vulnerable to attacks by hackers, enthusiasts, malware, and other illegal acts [2-3].
Therefore, the security and confidentiality of network information is an important issue. Therefore, the
network needs strong enough security measures. Without this, the network would be useless. Not only
that, it will also cause losses to users in various aspects and seriously endanger national security.
Whether it is a local area network or a broadband network, there are many factors, such as natural and
artificial vulnerability and potential threats [4-5]. Therefore, cyber security countermeasures can
comprehensively respond to various threats and vulnerabilities, thereby ensuring the confidentiality,
integration and availability of network information.
In order to reduce network security threats, this paper analyzes the types of security risks, and in-
depth studies on the vulnerability detection technology Fuzzing technology, and then performs
inspection and time-consuming analysis on existing vulnerability detection tools. The experimental
results prove that the vulnerability detection technology is beneficial Perform network security
protection.
2. Method
(1) Virus. Compared with ordinary viruses, high concealment and strong infectivity are the main
characteristics of network viruses, which can cause damage to any medium connected to the virus
computer in a short time and destroy the overall operating environment of the network [6-7]. At present,
the incidence of network viruses is high. With the continuous improvement of network technology and
computer technology, viruses have begun to diversify and their destructive power has been improved.
If you cannot operate the computer in a standardized way and you neglect to use security software, it
will easily lead to computer disease The system was attacked by a virus [8-9]. For example, in the
2
CCCIS2019 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 750 (2020) 012155 doi:10.1088/1757-899X/750/1/012155
downloading process, if you choose a website with a lower security to download, it is very vulnerable
to virus infection.
(2) Hackers. In the network age, we are no strangers to “hackers”, and we are aware of the threats
hackers pose to the security of network computers [10]. In short, for hackers with higher computer
technology, the existence of network security holes is equivalent to opening the door for hackers.
(3) There are loopholes in the network itself. As far as the current situation is concerned, there are
no perfect network management measures. Because of this, a variety of security vulnerabilities have
appeared. In other words, network vulnerabilities can be regarded as a computer security risk [11]. Not
only makes hacking more convenient, but also makes computers more vulnerable to virus infection. This
is especially obvious for some users who lack network security attempts, which will inevitably pose a
serious threat to network computer security.
3
CCCIS2019 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 750 (2020) 012155 doi:10.1088/1757-899X/750/1/012155
The process of Fuzzing test can be divided into 6 steps.The detailed introduction is as follows:
The specific methods and tools for fuzzing tests depend on the specific goals to be tested [12]. When
conducting a security audit of a completely self-developed internal software, it is necessary to carefully
select the test target. But when testing third-party non-self-developed application software, you can
choose a more flexible way. When determining the security vulnerabilities of third-party application
software, the first step is to consider changing the security vulnerabilities that have occurred in the
history of software, which has important reference research significance for subsequent security testing.
Whether it is a self-developed program or a third-party application, the most important reason for the
security vulnerability is because the user's illegal input and abnormal conditions have not been
effectively and comprehensively checked. Finding all possible input parameters, including normal and
abnormal parameters, is the key to the success of the fuzzing test. If the test vectors cannot be found
comprehensively, the effect of fuzz testing will be greatly affected.
Once the input vector of the target program is identified, the fuzzing test case generation can be based
on the input vector. The specific format of the target software program and the parameters it uses
determines whether a predetermined test case is used, or a test case that is temporarily generated during
the test, or a test case that is generated based on various algorithm (such as genetic algorithm) mutation
operators . However, no matter which method is selected last, test case generation must be automated.
This step inherits the previous step, which is the real step of the fuzzing test. It is the place where the
test process becomes a verb. In this step, the previously generated test cases are usually sent to the target
test program, or open the files related to the target program, or run the target test program. This step,
like the previous step, must be implemented in an automated manner.
In the process of fuzzing the target program, an often forgotten step is to monitor the abnormal
conditions that occur during the test. Suppose a scenario, during the ongoing test of the target program,
we sent 1,000,000 packets to the network service of the target server to be tested, and the network server
crashed. After the network server crashed, we were unable to find the previous test cases and could not
restore the previous crash. Then we can say that our test was invalid. According to the target program
being tested and the test cases used, appropriate monitoring methods can be used to effectively improve
the effectiveness and accuracy of vulnerability mining.
4
CCCIS2019 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 750 (2020) 012155 doi:10.1088/1757-899X/750/1/012155
When a security problem is found in the previous testing process, it is necessary to analyze and judge
whether the problem is reproducible, usable, and the danger and impact of the problem according to the
objectives of the audit.
3. Experiment
The test environment of WebvulScan vulnerability detection tool designed in this paper is mainly
divided into server environment and client environment, and the server environment is mainly to verify
the functional integrity of WebvulScan tool.
Client environment: Python2.7 and class libraries, LinuxOS, sqlite database, PC host, etc.
Server environment: aliyun cloud host, LinuxOS, Tomcat server, MySQL database, etc.
This article studies the causes, classification, and testing methods of network computer
vulnerabilities. In order to verify the integrity of the vulnerability detection tool WebvulScan and
whether it achieves the corresponding performance, the software needs to perform integrity tests and
system performance tests.
System integrity test: Build a website with simple vulnerabilities and access on a local or cloud server.
The software detects the website and generates a report file. Test the integrity of the system function by
comparing the number of pages crawled in the report document and whether the detected vulnerabilities
are consistent with the number of web pages and vulnerabilities recorded during development.
Performance test: Select several representative web vulnerability detection tools, such as WS Fuzzer,
Web Inspect, X5S, etc., by testing the same multiple web applications and comparing the test results
with these tools to verify the efficiency of the Webvul Scan tool and accuracy.
4. Discussion
Through experiments, we can easily find that when there are fewer pages, the detection takes less time.
On the contrary, when there are more pages and more page elements, the detection time will increase
accordingly. The experimental results are shown in Table 1 and Figure 1.
5
CCCIS2019 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 750 (2020) 012155 doi:10.1088/1757-899X/750/1/012155
80
70
time comsuing detaction
60
50
40
30
20
10
0
WSFuzzer WebFuzz Webvul Scan
Open source system personal blog Mall forum
4.2 Suggestions for Improving Computer Network Security Vulnerability Mining Technology
The development of computer network security vulnerabilities is inseparable from professional and
technical personnel. In short, professional and technical personnel play a core role in computer network
security vulnerability repair technology. Therefore, in order to attract outstanding talents, it is necessary
to take all measures. Through leniency, you can attract outstanding people. In order to make the best use
of the advantages of talents, strengthen the support of knowledge and skills related to the vulnerability
development technology of computer network security.
In order to further promote the application of computer network security vulnerability mining
technology, security scanning technology can be used in the process of use. Vulnerability scanning is
mainly to confirm the port information of the computer, and to confirm whether there are vulnerabilities
and ports through scanning. Of course, the principle of vulnerability scanning is to use various simulated
attack methods to detect whether the target host has a security vulnerability. After port scanning, the
target host can open ports and network services with corresponding ports. Compare this data effectively
6
CCCIS2019 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 750 (2020) 012155 doi:10.1088/1757-899X/750/1/012155
to confirm whether the system has security holes. The network has been developed on a large scale, and
network security vulnerabilities have provided powerful technical support for the secure operation of
computer networks.
In order to further develop the vulnerabilities of computer network security, white box, gray box,
and black box tests can be used. That is, all resources are accessed through known source code to
determine whether a computer system has a security vulnerability. This test method is a code inspection
of a network security vulnerability system to check for vulnerabilities. If there are loopholes, in order to
reduce the losses caused by computer network security, it is necessary for relevant personnel to take
reasonable countermeasures to solve them.
5. Conclusion
At present, people's lives, studies, and work are inseparable from network computers. It can be said that
network computers are an important element in life. Therefore, in order to enable it to play a greater role
in our lives, improve learning and work efficiency, and bring us more entertainment, we must first
understand the potential safety hazards and implement effective preventive measures to timely discover
hidden security risks and make up for them, so that we can live and work better with the help of network
computers.
References
[1] Forshaw M. Novel use of network computer facilities for GCSE coursework[J]. Electronics
Education, 2017, 1992(2):25-26.
[2] Sulaiman, Jumat, Saudi, Azali, Hamid, Fazli Abd. Selected Peer-Reviewed Articles from the
International Conference on Computer and Network Applications (ICCNA2017), Sabah,
Malaysia, 5–6 September, 2017[J]. Advanced Science Letters, 2018, 24(3):1543-1544.
[3] H.-Q. Duan, B.-H. Tang. Prediction of data flow in computer network based on linear multi-scale
model[J]. Shenyang Gongye Daxue Xuebao/Journal of Shenyang University of Technology,
2017, 39(3):322-327.
[4] Praude C C. Computer Art and Actor-Network Theory: Actants and Intersubjective Associations in
Scene[J]. Leonardo, 2018, 51(5):529-529.
[5] Cotroneo, Domenico, Iannillo, Antonio Ken, Natella, Roberto. Evolutionary Fuzzing of Android OS
Vendor System Services[J]. Empirical Software Engineering, 2019, 24(6):3630-3658.
[6] B.G. Tsenov, R.J. Emery, L.W. Whitehead. A Pilot Examination of the Methods Used to Counteract
Insider Threat Security Risks Associated with the Use of Radioactive Materials in the
Research and Clinical Setting[J]. Health Physics, 2018, 114(3):1.
[7] Rachel V. Rose, Joseph S. Kass. Mitigating Cybersecurity Risks[J]. Continuum Lifelong Learning
in Neurology, 2017, 23(2):553-556.
7
CCCIS2019 IOP Publishing
IOP Conf. Series: Materials Science and Engineering 750 (2020) 012155 doi:10.1088/1757-899X/750/1/012155
[8] Zhiyi Li, Dong Jin, Christopher Hannon. Assessing and mitigating cybersecurity risks of traffic light
systems in smart cities[J]. IET Cyber-Physical Systems: Theory & Applications, 2017,
1(1):60-69.
[9] Bonnafous L, Lall U, Siegel J. A water risk index for portfolio exposure to climatic extremes:
conceptualization and an application to the mining industry[J]. Hydrology & Earth System
Sciences, 2017, 21(4):1-54.
[10] Keagen LIEBENBERG, Ansie SMIT, Serena COETZEE. A GIS approach to seismic risk
assessment with an application to mining related seismicity in Johannesburg, South Africa[J].
Acta Geophysica, 2017, 65(4):1-13.
[11] Li W, Liu Y, Qiao W, et al. An Improved Vulnerability Assessment Model for Floor Water Bursting
fr[J]. Mine Water & the Environment, 2017, 37(1):1-9.
[12] Sang Y, Shen H, Tian H, et al. Achieving Probabilistic Anonymity in a Linear and Hybrid
Randomization Model[J]. IEEE Transactions on Information Forensics & Security, 2018,
11(10):2187-2202.