期刊论文详细信息
Cybersecurity
ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies
Chia-Wei Tien1  Pei-Yi Lin1  Chin-Wei Tien1  Ting-Chun Huang1 
[1] Cybersecurity Technology Institute, Institute for Information Industry Taiwan, China;
关键词: Industrial communication protocol;    Network protocol fuzzing;    Long short-term memory (LSTM);    Industrial control system (ICS);   
DOI  :  10.1186/s42400-021-00087-5
来源: DOAJ
【 摘 要 】

Abstract The fuzzing test is able to discover various vulnerabilities and has more chances to hit the zero-day targets. And ICS(Industrial control system) is currently facing huge security threats and requires security standards, like ISO 62443, to ensure the quality of the device. However, some industrial proprietary communication protocols can be customized and have complicated structures, the fuzzing system cannot quickly generate test data that adapt to various protocols. It also struggles to define the mutation field without having prior knowledge of the protocols. Therefore, we propose a fuzzing system named ICPFuzzer that uses LSTM(Long short-term memory) to learn the features of a protocol and generates mutated test data automatically. We also use the responses of testing and adjust the weight strategies to further test the device under testing (DUT) to find more data that cause unusual connection status. We verified the effectiveness of the approach by comparing with the open-source and commercial fuzzers. Furthermore, in a real case, we experimented with the DLMS/COSEM for a smart meter and found that the test data can cause a unusual response. In summary, ICPFuzzer is a black-box fuzzing system that can automatically execute the testing process and reveal vulnerabilities that interrupt and crash industrial control communication. Not only improves the quality of ICS but also improves safety.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次