Cargando…
Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer
Vulnerability mining technology is used for protecting the security of industrial control systems and their network protocols. Traditionally, vulnerability mining methods have the shortcomings of poor vulnerability mining ability and low reception rate. In this study, a test case generation model fo...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7180888/ https://www.ncbi.nlm.nih.gov/pubmed/32260503 http://dx.doi.org/10.3390/s20072040 |
_version_ | 1783525923878862848 |
---|---|
author | Lai, Yingxu Gao, Huijuan Liu, Jing |
author_facet | Lai, Yingxu Gao, Huijuan Liu, Jing |
author_sort | Lai, Yingxu |
collection | PubMed |
description | Vulnerability mining technology is used for protecting the security of industrial control systems and their network protocols. Traditionally, vulnerability mining methods have the shortcomings of poor vulnerability mining ability and low reception rate. In this study, a test case generation model for vulnerability mining of the Modbus TCP based on an anti-sample algorithm is proposed. Firstly, a recurrent neural network is trained to learn the semantics of the protocol data unit. The softmax function is used to express the probability distribution of data values. Next, the random variable threshold and the maximum probability are compared in the algorithm to determine whether to replace the current data value with the minimum probability data value. Finally, the Modbus application protocol (MBAP) header is completed according to the protocol specification. Experiments using the anti-sample fuzzer show that it not only improves the reception rate of test cases and the ability to exploit vulnerabilities, but also detects vulnerabilities of industrial control protocols more quickly. |
format | Online Article Text |
id | pubmed-7180888 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-71808882020-05-01 Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer Lai, Yingxu Gao, Huijuan Liu, Jing Sensors (Basel) Article Vulnerability mining technology is used for protecting the security of industrial control systems and their network protocols. Traditionally, vulnerability mining methods have the shortcomings of poor vulnerability mining ability and low reception rate. In this study, a test case generation model for vulnerability mining of the Modbus TCP based on an anti-sample algorithm is proposed. Firstly, a recurrent neural network is trained to learn the semantics of the protocol data unit. The softmax function is used to express the probability distribution of data values. Next, the random variable threshold and the maximum probability are compared in the algorithm to determine whether to replace the current data value with the minimum probability data value. Finally, the Modbus application protocol (MBAP) header is completed according to the protocol specification. Experiments using the anti-sample fuzzer show that it not only improves the reception rate of test cases and the ability to exploit vulnerabilities, but also detects vulnerabilities of industrial control protocols more quickly. MDPI 2020-04-05 /pmc/articles/PMC7180888/ /pubmed/32260503 http://dx.doi.org/10.3390/s20072040 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Lai, Yingxu Gao, Huijuan Liu, Jing Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer |
title | Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer |
title_full | Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer |
title_fullStr | Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer |
title_full_unstemmed | Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer |
title_short | Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer |
title_sort | vulnerability mining method for the modbus tcp using an anti-sample fuzzer |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7180888/ https://www.ncbi.nlm.nih.gov/pubmed/32260503 http://dx.doi.org/10.3390/s20072040 |
work_keys_str_mv | AT laiyingxu vulnerabilityminingmethodforthemodbustcpusinganantisamplefuzzer AT gaohuijuan vulnerabilityminingmethodforthemodbustcpusinganantisamplefuzzer AT liujing vulnerabilityminingmethodforthemodbustcpusinganantisamplefuzzer |