ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies

Author:

Lin Pei-Yi,Tien Chia-WeiORCID,Huang Ting-Chun,Tien Chin-Wei

Abstract

AbstractThe fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets. And ICS(Industrial control system) is currently facing huge security threats and requires security standards, like ISO 62443, to ensure the quality of the device. However, some industrial proprietary communication protocols can be customized and have complicated structures, the fuzzing system cannot quickly generate test data that adapt to various protocols. It also struggles to define the mutation field without having prior knowledge of the protocols. Therefore, we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory) to learn the features of a protocol and generates mutated test data automatically. We also use the responses of testing and adjust the weight strategies to further test the device under testing (DUT) to find more data that cause unusual connection status. We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers. Furthermore, in a real case, we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response. In summary, ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication. Not only improves the quality of ICS but also improves safety.

Publisher

Springer Science and Business Media LLC

Subject

Artificial Intelligence,Computer Networks and Communications,Information Systems,Software

Reference48 articles.

1. Bengio, Y, Simard P, Frasconi P (1994) Learning long-term dependencies with gradient descent is difficult. IEEE Trans Neural Netw 5(2):157–166.

2. Beyond security (2020) BeSTORM: Black box testing. https://beyondsecurity.com/solutions/bestorm.html?cn-reloaded=1. Accessed 13 Dec 2020.

3. Böttinger, K, Godefroid P, Singh R (2018) Deep reinforcement fuzzing In: 2018 IEEE Security and privacy workshops (SPW), 116–122. https://doi.org/10.1109/SPW.2018.00026.

4. Darkweb and nnovic (2011) ModbusPal - Java MODBUS simulator. http://modbuspal.sourceforge.net/. Accessed 13 Dec 2020.

5. GISA Security Compliance Institute (2020) IEC-62443-CSA-Certification. https://www.isasecure.org/en-US/Certification/IEC-62443-CSA-Certification#tab2. Accessed 13 Dec 2020.

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3