Cargando…
Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models
Smart production ecosystems are a valuable target for attackers. In particular, due to the high level of connectivity introduced by Industry 4.0, attackers can potentially attack individual components of production systems from the outside. One approach to strengthening the security of industrial co...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10537775/ https://www.ncbi.nlm.nih.gov/pubmed/37765921 http://dx.doi.org/10.3390/s23187864 |
_version_ | 1785113174219948032 |
---|---|
author | Borcherding, Anne Morawetz, Martin Pfrang, Steffen |
author_facet | Borcherding, Anne Morawetz, Martin Pfrang, Steffen |
author_sort | Borcherding, Anne |
collection | PubMed |
description | Smart production ecosystems are a valuable target for attackers. In particular, due to the high level of connectivity introduced by Industry 4.0, attackers can potentially attack individual components of production systems from the outside. One approach to strengthening the security of industrial control systems is to perform black box security tests such as network fuzzing. These are applicable, even if no information on the internals of the control system is available. However, most security testing strategies assume a gray box setting, in which some information on the internals are available. We propose a new approach to bridge the gap between these gray box strategies and the real-world black box setting in the domain of industrial control systems. This approach involves training an adaptive machine learning model that approximates the information that is missing in a black box setting. We propose three different approaches for the model, combine them with an evolutionary testing approach, and perform an evaluation using a System under Test with known vulnerabilities. Our evaluation shows that the model is indeed able to learn valuable information about a previously unknown system, and that more vulnerabilities can be uncovered with our approach. The model-based approach using a Decision Tree was able to find a significantly higher number of vulnerabilities than the two baseline fuzzers. |
format | Online Article Text |
id | pubmed-10537775 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-105377752023-09-29 Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models Borcherding, Anne Morawetz, Martin Pfrang, Steffen Sensors (Basel) Article Smart production ecosystems are a valuable target for attackers. In particular, due to the high level of connectivity introduced by Industry 4.0, attackers can potentially attack individual components of production systems from the outside. One approach to strengthening the security of industrial control systems is to perform black box security tests such as network fuzzing. These are applicable, even if no information on the internals of the control system is available. However, most security testing strategies assume a gray box setting, in which some information on the internals are available. We propose a new approach to bridge the gap between these gray box strategies and the real-world black box setting in the domain of industrial control systems. This approach involves training an adaptive machine learning model that approximates the information that is missing in a black box setting. We propose three different approaches for the model, combine them with an evolutionary testing approach, and perform an evaluation using a System under Test with known vulnerabilities. Our evaluation shows that the model is indeed able to learn valuable information about a previously unknown system, and that more vulnerabilities can be uncovered with our approach. The model-based approach using a Decision Tree was able to find a significantly higher number of vulnerabilities than the two baseline fuzzers. MDPI 2023-09-13 /pmc/articles/PMC10537775/ /pubmed/37765921 http://dx.doi.org/10.3390/s23187864 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Borcherding, Anne Morawetz, Martin Pfrang, Steffen Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models |
title | Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models |
title_full | Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models |
title_fullStr | Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models |
title_full_unstemmed | Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models |
title_short | Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models |
title_sort | smarter evolution: enhancing evolutionary black box fuzzing with adaptive models |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10537775/ https://www.ncbi.nlm.nih.gov/pubmed/37765921 http://dx.doi.org/10.3390/s23187864 |
work_keys_str_mv | AT borcherdinganne smarterevolutionenhancingevolutionaryblackboxfuzzingwithadaptivemodels AT morawetzmartin smarterevolutionenhancingevolutionaryblackboxfuzzingwithadaptivemodels AT pfrangsteffen smarterevolutionenhancingevolutionaryblackboxfuzzingwithadaptivemodels |