Industrial control private agreement-based fuzzy test method

A proprietary protocol and fuzz testing technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems that the vulnerability mining method is not suitable for industrial control networks and less research

Active Publication Date: 2017-10-10
BEIJING UNIV OF TECH
View PDF7 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Research on vulnerability mining technology in the security field at home and abroad has achieved certain results, but traditional network vulnerability mining methods are not suitable for industrial control networks, and there are few studies on how to mine vulnerabilities in industrial control systems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Industrial control private agreement-based fuzzy test method
  • Industrial control private agreement-based fuzzy test method
  • Industrial control private agreement-based fuzzy test method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The present invention will be described in detail below in conjunction with specific embodiments shown in the accompanying drawings.

[0016] figure 1 It is a schematic structural diagram of the fuzzing testing method based on the industrial control private protocol of the present invention, such as figure 1 As shown, the steps include:

[0017] Step 11: In the normal industrial control process environment, collect the communication traffic of the private protocol, and use wireshark to save it as a pcap file. The program instantiates a virtual capture device through the ICaptureDevice interface of SharpPcap, uses TcpDump rules to filter the sample set, saves all request data in the request queue, and saves all request response data in the request response queue.

[0018] Step 12: Use the protocol tree generation algorithm to classify the private protocol packets through the two buffer queues, and generate a private protocol feature classification tree by instantiating...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an industrial control private agreement-based fuzzy test method. A protocol tree for a private agreement is constructed through private agreement data flow captured in a normal industrial control network environment and a private agreement tree construction algorithm, a request message and a response message are effectively classified. Basic protocol information is learned, and protocol characteristics are learned through counting data sequences of individual classes and using probability statistics, a length domain recognition algorithm, an Apriori association rule algorithm and a Needleman/Wunsch pairwise sequence alignment algorithm. Different protocol characteristics are varied by using a variation rule to generate test cases. The connection condition with a tested device is monitored in the test process and the response data condition of the tested device is detected by using request and response characteristics. According to the method, the problem of efficiency of fuzzy test of the industrial control private agreement can be solved, and the effectiveness of the test cases is improved. The method comprises a data preprocessing module, a protocol learning module, a fuzzy test module and an exception alarm module.

Description

technical field [0001] The invention belongs to the combination of the industrial network security technical field and the fuzzy testing technical field, and relates to a learning method of an industrial control private protocol and a fuzzy testing method based on the industrial control private protocol. Background technique [0002] Industrial Control System (Industrial Control Systems, ICS) refers to the control network and system in the industrial production process, and is a key component of the country's critical infrastructure. At present, industrial control systems have been widely used in various industrial fields such as petroleum and petrochemical, traffic control, power facilities, manufacturing and nuclear industries. With the in-depth integration of my country's informatization and industrialization, industrial control systems have been more and more widely used in industrial production processes. More and more industrial field devices integrate Ethernet communi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
CPCH04L41/06H04L43/08H04L43/50
Inventor 赖英旭杨凯翔刘岩蔡晓田刘静庄俊玺
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products