期刊文献+

基于Peach的工业控制网络协议安全分析 被引量:25

Security analysis of industrial control network protocols based on Peach
原文传递
导出
摘要 模糊测试技术是发现未公开漏洞的重要技术手段之一。该文基于Peach提出了工业控制网络协议的安全分析方法。该方法采用变异策略,构造畸形网络数据包,发送给被测目标进行测试,在测试过程中监测被测目标工控网络协议的运行状况,发现网络异常并进行异常分析。该方法以一种公开的大范围使用的工业控制网络协议Modbus TCP为例分析了其安全性。实验结果表明,该方法在工业控制网络协议的安全漏洞挖掘方面是有效的。 Fuzzing tests are important for discovery of unknown vulnerabilities and risks. A security analysis method was developed for industrial control networks using the Peach fuzzing framework. The system uses the mutation strategy by fabricating abnormal network packets, sending these packets to the target and then executing tests. The tests monitor the status of the industrial control network protocols. The system then identifies exceptions in the industrial control network protocols. Modbus TCP, a widely used industrial control network protocol is analyzed as an example using a fuzzy Modbus TCP protocol. The results show that this method can effectively identify vulnerabilities in industrial control network protocols.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2017年第1期50-54,共5页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金面上项目(61472448) 国家自然科学基金青年科学基金项目(61401517)
关键词 工业控制系统 工业控制网络协议 PEACH 模糊测试 漏洞分析 industrial control systemsl industrial control network protocols Peach fuzzing test vulnerability analyses
  • 相关文献

参考文献4

二级参考文献65

  • 1Cowan C,Wagle P,Pu C,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade[C]//Proc.of DARPA Information Survivability Conference and Exposition.[S.l.]:DARPA Press,2000.
  • 2Du Wenliang,Mathur A P.Vulnerability Testing of Software System Using Fault Injection[R].Coast,TR 98-02,1998.
  • 3Evans D,Larochelle D.Improving Security Using Extensible Lightweight Static Analysis[J].IEEE Software,2002,19(1):42-51.
  • 4Bohm C, Gruber M, Kunath P, Pryakhin A, Schubert M. ProVer: Probabilistic video retrieval using the gauss-tree. In Proc. the 23rd ICDE, April 2007, pp.1521-1522.
  • 5Chen L, Ng R T. On the marriage of Lp-norms and edit distance. In Proc. the 30th VLDB, August 31-September 3, 2004, pp.792-803.
  • 6Chen L, Czsu M T, Oria V. Robust and fast similarity search for moving object trajectories. In Proc. ACM SIG- MOD, June 2005, pp.491-502.
  • 7Cheng R, Kalashnikov D V, Prabhakar S. Querying im- precise data in moving object environments. IEEE Trans. Knowl. Data Eng., 2004, 16(9): 1112-1127.
  • 8Deshpande A, viprin C, Madden S, Hellerstein J M, Hong W. Model-driven data acquisition in sensor networks. In Proc. the 30th VLDB, August 31-September 3, 2004, pp.588-599.
  • 9Kodialam M S, Nandagopal T. Fast and reliable estimation schemes in RFID systems. In Proc. the 12th MOBICOM, September 2006, pp.322-333.
  • 10Liu Y, Liu K, Li M. Passive diagnosis for wireless sensor net- works. IEEE/ACM Trans. Netw., 2010, 18(4): 1132-1144.

共引文献46

同被引文献172

引证文献25

二级引证文献132

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部