Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A system and method for vulnerability detection of power Internet of Things protocol based on fuzzing

A technology for power Internet of Things and vulnerability detection, applied in the field of Internet of Things, can solve problems such as inability to detect protocol vulnerabilities, and achieve the effects of flexible sample generation, commission efficiency, and improved ability.

Active Publication Date: 2022-08-05
STATE GRID HUBEI ELECTRIC POWER RES INST +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing traditional testing methods cannot effectively detect protocol vulnerabilities in the power Internet of Things industrial control system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for vulnerability detection of power Internet of Things protocol based on fuzzing
  • A system and method for vulnerability detection of power Internet of Things protocol based on fuzzing
  • A system and method for vulnerability detection of power Internet of Things protocol based on fuzzing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present invention.

[0042] Fuzzy testing is widely used in software testing as a vulnerability mining method, and the present invention uses the fuzzing testing method to perform security detection on the protocol. Fuzz testing mainly generates the required test samples through certain rules, and automatically sends the test samples to the test target to cause ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a system and method for detecting loopholes in the power Internet of Things protocol based on fuzz testing. The system includes a protocol configuration module, which is used to configure the checked protocol and the data frame under the checked protocol; After entering the protocol and data frame configured by the protocol configuration module, the mutation strategy configuration is performed according to the loaded protocol, and the test sample is generated according to the configured mutation strategy; the execution monitoring module is used to transmit the test sample generated by the sample generation module. The device under test performs the test, manages the link, executes the test, and finally stores the test result and generates the test report. The invention takes the three main modules of the inspection protocol management, mutation strategy configuration and inspection details query as the core, constructs the fuzzy test detection process, and forms a prototype system for detection of loopholes in the industrial control protocol of the power Internet of Things, which can conveniently, quickly and effectively carry out protocol configuration and inspection. test.

Description

technical field [0001] The invention relates to the technical field of the Internet of Things, in particular to a system and method for detecting loopholes in a power Internet of Things protocol based on fuzzy testing. Background technique [0002] With the continuous development of Internet of Things technology and communication capabilities, the power Internet of Things based on industrial control systems is also constantly improving and gradually developing. At the same time as the development of the power Internet of things, the security problems of the network communication of the power Internet of things related to it are gradually exposed. The industrial control protocol of the power Internet of Things is different from the traditional network communication protocol. The industrial control protocol is based on the industrial control system and is mainly used to complete the mutual communication between the industrial control systems. Power Internet of Things architec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06Q50/06
CPCG06F21/577G06Q50/06H04L63/1433
Inventor 王晋沈煜刘畅徐江珮喻潇田里王捷周亮龙凤
Owner STATE GRID HUBEI ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products