Method and system for fuzzy test of industrial control network protocol based on reverse analysis

An industrial control network and reverse analysis technology, applied in the field of network security, can solve problems such as the key sequence of the protocol is mixed with noise, the reverse effect of the protocol is not ideal, and the protocol format cannot be obtained, so as to achieve the effect of optimizing the generation process.

Inactive Publication Date: 2020-01-07
CHINA ELECTRIC POWER RES INST +3
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The improved algorithm Discoverer in 2007 used the packet sequence analysis method to realize the complete extraction of the packet format, but the analysis result lacked the semantic analysis of the protocol
[0008] Due to the progressive multiple sequence alignment algorithm based on large-scale network traffic and protocol messages, this method can analyze the semantics of the protocol very well, but it cannot obtain the complete protocol format, because

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for fuzzy test of industrial control network protocol based on reverse analysis
  • Method and system for fuzzy test of industrial control network protocol based on reverse analysis
  • Method and system for fuzzy test of industrial control network protocol based on reverse analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Exemplary embodiments of the present invention will now be described with reference to the drawings; however, the present invention may be embodied in many different forms and are not limited to the embodiments described herein, which are provided for the purpose of exhaustively and completely disclosing the present invention. invention and fully convey the scope of the invention to those skilled in the art. The terms used in the exemplary embodiments shown in the drawings do not limit the present invention. In the figures, the same units / elements are given the same reference numerals.

[0039] Unless otherwise specified, the terms (including scientific and technical terms) used herein have the commonly understood meanings to those skilled in the art. In addition, it can be understood that terms defined by commonly used dictionaries should be understood to have consistent meanings in the context of their related fields, and should not be understood as idealized or overly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for fuzzy test of an industrial control network protocol based on reverse analysis, and belongs to the technical field of network security. The method comprises the following steps: performing reverse analysis on an industrial control network protocol to generate a rule tree, preprocessing the rule tree, and screening out a plurality of sub-sequences of candidate key sequences; generating a subsequence set W of the key sequences; forming a protocol state machine; and using a protocol state machine to perform variation on the rule tree nodes according to the rule tree rules, generating a fuzzy test case, and performing fuzzy test on the target industrial control network protocol. The problem that a traditional fuzzy test method cannot perform vulnerability mining on an industrial control proprietary protocol is solved, and the test case generation process is optimized.

Description

technical field [0001] The invention relates to the technical field of network security, and more specifically, to a method and system for fuzzing an industrial control network protocol based on reverse analysis. Background technique [0002] With the full integration of industrial networks, the Internet, and the Internet of Things, network security risks have also greatly increased. For the industrial control system, those who originally designed the industrial control system only considered the availability of the industrial control system, but ignored the security design of the system. Over time, security issues will be exposed to people's vision. In recent years, industrial control security incidents have occurred frequently, "Stuxnet" virus, Ukraine power outage, etc., have caused serious damage to the society and the people, and at present, many core technologies of equipment rely on imports. The risk of device backdoors, so vulnerability mining has become a necessary...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1433H04L63/14H04L41/14
Inventor 王海翔缪思薇周亮朱朝阳孙辰军杨波余文豪朱亚运韩丽芳应欢张晓娟
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products