Abstract
AbstractThe fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets. And ICS(Industrial control system) is currently facing huge security threats and requires security standards, like ISO 62443, to ensure the quality of the device. However, some industrial proprietary communication protocols can be customized and have complicated structures, the fuzzing system cannot quickly generate test data that adapt to various protocols. It also struggles to define the mutation field without having prior knowledge of the protocols. Therefore, we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory) to learn the features of a protocol and generates mutated test data automatically. We also use the responses of testing and adjust the weight strategies to further test the device under testing (DUT) to find more data that cause unusual connection status. We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers. Furthermore, in a real case, we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response. In summary, ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication. Not only improves the quality of ICS but also improves safety.
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference48 articles.
1. Bengio, Y, Simard P, Frasconi P (1994) Learning long-term dependencies with gradient descent is difficult. IEEE Trans Neural Netw 5(2):157–166.
2. Beyond security (2020) BeSTORM: Black box testing. https://beyondsecurity.com/solutions/bestorm.html?cn-reloaded=1. Accessed 13 Dec 2020.
3. Böttinger, K, Godefroid P, Singh R (2018) Deep reinforcement fuzzing In: 2018 IEEE Security and privacy workshops (SPW), 116–122. https://doi.org/10.1109/SPW.2018.00026.
4. Darkweb and nnovic (2011) ModbusPal - Java MODBUS simulator. http://modbuspal.sourceforge.net/. Accessed 13 Dec 2020.
5. GISA Security Compliance Institute (2020) IEC-62443-CSA-Certification. https://www.isasecure.org/en-US/Certification/IEC-62443-CSA-Certification#tab2. Accessed 13 Dec 2020.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献