计算机科学 ›› 2022, Vol. 49 ›› Issue (10): 310-318.doi: 10.11896/jsjkx.210700248

• 信息安全 • 上一篇    下一篇

PGNFuzz:基于指针生成网络的工业控制协议模糊测试框架

王田原, 武淑红, 李兆基, 辛昊光, 李璇, 陈永乐   

  1. 太原理工大学信息与计算机学院 山西 晋中 030600
  • 收稿日期:2021-07-26 修回日期:2021-12-06 出版日期:2022-10-15 发布日期:2022-10-13
  • 通讯作者: 武淑红(wushuhong@tyut.edu.cn)
  • 作者简介:(wty971212@126.com)
  • 基金资助:
    山西省重点研发计划(201903D121121)

PGNFuzz:Pointer Generation Network Based Fuzzing Framework for Industry Control Protocols

WANG Tian-yuan, WU Shu-hong, LI Zhao-ji, XIN Hao-guang, LI Xuan, CHEN Yong-le   

  1. College of Information and Computer Science,Taiyuan University of Technology,Jinzhong,Shanxi 030600,China
  • Received:2021-07-26 Revised:2021-12-06 Online:2022-10-15 Published:2022-10-13
  • About author:WANG Tian-yuan,born in 1997,postgraduate,is a student member of China Computer Federation.His main research interests include vulnerability mining,information security and machine learning.
    WU Shu-hong,born in 1969,Ph.D,associate professor,master supervisor.Her main research interests include embedded systems,intelligent information processing,brain informatics and information security.
  • Supported by:
    Provincial Key Research and Development Program of Shanxi(201903D121121).

摘要: 工业安全问题一直是重要而紧迫的全球性问题,工控协议被广泛应用于工业控制系统(Industrial Control System,ICS)组件之间的通信,其安全性关系到整个系统的安全稳定运行,迫切需要保证所有工控协议的安全。网络协议模糊测试对保证ICS的安全性和可靠性起着重要的作用,传统的模糊测试方法提高了工控协议的安全性,其中许多方法具有实际应用价值。然而,传统的模糊测试方法严重依赖于工控协议的规范,使得测试过程昂贵、耗时、麻烦和枯燥,如果规范不存在,任务就很难进行。因此,文中提出了一种基于指针生成网络(Pointer-Generator Networks,PGN)的智能且自动的协议模糊测试方法,并给出了一系列的性能指标。在此基础之上,设计了一个自动化智能应用模糊测试框架PGNFuzz,可用于各种工业控制协议。采用Modbus和EtherCAT等几种典型的工控协议对该框架的有效性和效率进行测试,实验结果表明,该方法在便捷性、有效性和效率方面均优于其他通用型模糊器(General Purpose Fuzzer,GPF)和其他基于深度学习的模糊测试方法。

关键词: 自动化漏洞挖掘, 模糊测试, 工业控制协议, 工业安全, 深度学习, 指针生成网络

Abstract: Industrial security issues have always been an important and urgent issue globally.Industrial control protocols are widely used in the communication between industrial control system(ICS) components.Their security is related to the safe and stable operation of the entire system,and there is an urgent need to ensure the security of all industrial control protocols.The network protocol fuzzing plays an important role in ensuring the security and reliability of ICS.Traditional fuzzing methods can improve the security testing of industrial control protocols,and many of which have practical applications.However,most traditional fuzzing methods rely heavily on specifications of industrial control protocols,making the test process costly,time-consuming,cumbersome and boring.If the norm does not exist,the task is difficult to carry out.This paper proposes an intelligent and automatic protocol fuzzing method based on pointer-generation networks(PGN),and gives a series of performance indicators.On the basis of this method,an intelligent and automatic fuzzing framework based on PGNFuzz for application is designed,which can be used for various industrial control protocols.Several typical industrial control protocols such as Modbus and EtherCAT are used to test the validity and efficiency of our framework.Experiment results show that our method is superior to other general purpose fuzzers(GPF) and other deep learning based fuzzing methods in terms of convenience,effectiveness and efficiency.

Key words: Automatic vulnerability mining, Fuzzing, Industrial control protocols, Industrial security, Deep learning, Pointer-gene-ration networks

中图分类号: 

  • TP273
[1]KIM S K,KOPPEN M ,BASHIR A K,et al.Advanced ICT andIOT Technologies for the fourth Industrial Revolution [J].Intelligent Automation & Soft Computing,2020,26(1):83-85.
[2]WAN M,LI J,LIU Y,et al.Characteristic insights on industrial cyber security and popular defense mechanisms [J].China Communications,2021,18(1):130-150.
[3]MILLER B P,FREDRIKSEN L,SO B,et al.An empirical study of the reliability of UNIX utilities[J].Communications of the ACM,1990,33(12):32-44.
[4]RAULI K,MARKO L,ARI T.Software security assessmentthrough specification mutations and fault injection [C]//Communications and Multimedia Security Issues of the New Century.New York:Springer,2001:173-183.
[5]GREG B,MARCO C,VIKTORIA F.Snooze:toward a stateful network protocol fuzzer [C]//International Conference on Information Security.New York:ACM,2006:343-358.
[6]DEVARAJAN G.Unraveling SCADA protocols:using sulleyfuzzer,presented at the DefCon 15 Hacking conference [EB/OL].http://www.defcon.org/html/defcon-15/de-15-speakers.html.
[7]VOVIATZIS A G,KATSIGIANNIS K,KOUBIAS S.A Mod-bus/TCP Fuzzer for testing internetworked industrial systems[C]//2015 IEEE 20th Conference on Emerging Technologies & Factory Automation(ETFA).IEEE,2015.
[8]HU Z C,SHI J Q,HUANG Y H,et al.GANFuzz:A Gan-basedindustrial network protocol fuzzing framework [C]//The 15th ACM International Conference,Computing.Frontiers.New York:ACM,2018:138-145.
[9]LI Z H,ZHAO H,SHI J Q,et al.An Intelligent Fuzzing Data Generation Method Based on Deep Adversarial Learning [J].IEEE Access,2019,7:49327-49340.
[10]ZHAO H,LI Z H,WEI H S,et al.SeqFuzzer:An IndustrialProtocol Fuzzing Framework from a Deep Learning Perspective [C]//2019 12th IEEE Conference on Software Testing,Validation and Verification.Xi'an,China:ICST,2019:59-67.
[11]TU Z P,LU Z D,LIU Y,et al.Modeling coverage for neural machine translation [C]//Proceedings of the 54th Annual Mee-ting of the Association for Computational Linguistics.Berlin:ACL,2016:76-85.
[12]GODEFROID P,PELEG H,SINGH R.Learn&fuzz:Machinelearning for input fuzzing [C]//Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering.Urbana:IEEE Press,2017:50-59.
[13]RAJPAL M,BLUM W,SINGH R.Not all bytes are equal:Neural byte sieve for fuzzing [EB/OL].https://arxiv.org/abs/1711.04596.
[14]NICHOLS N,RAUGAS M,JASPER R,et al.Faster fuzzing:Reinitialization with deep neural models [EB/OL].https://ar-xiv.org/abs/1711.02807.
[15]FAN R,CHANG Y.Machine learning for black- box fuzzing of network protocols [C]//International Conference on Information and Communications Security.Beijing:ICICS,2017:621-632.
[16]JUSTIN S,JUAN P B.Deep convolutional neural networks and data augmentation for environmental sound classification [J].IEEE Signal Process Letters,2017,44(3):279-283.
[17]LEVY O,GOLDBERG Y.Neural word embedding as implicit matrix factorization [C]//Proceedings of the 28th International Conference on Neural Information Processing Systems.Mon-treal:NIPS,2014:2177-2185.
[18]DZMITRY B,KYUNGHYUN C,YOSHUA B.Neural Machine Translation by Jointly Learning to Align and Translate [C]//3rd International Conference on Learning Representations.San Diego:ICLR,2017.
[19]ORIOL V,MEIRE F,NAVDEEP J.Pointer networks [C]//Proceedings of the 29th International Conference on Neural Information Processing Systems.Montreal:NIPS,2015.
[20]DAI A M,LE Q V.Semi-supervised sequence learning [C]//Proceedings of the 28th International Conference on Neural Information Processing Systems.Montreal:NIPS,2014:3079-3087.
[21]KINGMA D,BA J.ADAM:A method for stochastic optimization [C]//the 3rd International Conference for Learning Representations.San Diego:ICLR,2015.
[22]DODDINGTON G.Automatic evaluation of machine translation quality using n-gram co-occurrence statistics [C]//Proceedings of the Second International Conference on Human Language Technology Research.San Francisco:HLT,2002:138-145.
[23]ROBERTS JR JD,IHNAT J,SMITH JR W.Microprogrammed control unit(MCU) programming reference manual [C]//ACM Sigmicro Newsletter.1972:18-57.
[24]FENG Z L,YU J X.Design and implementation of rs485 bus communication protocol [J].Computer Engineering,2012,38(20):215-218.
[1] 饶志双, 贾真, 张凡, 李天瑞.
基于Key-Value关联记忆网络的知识图谱问答方法
Key-Value Relational Memory Networks for Question Answering over Knowledge Graph
计算机科学, 2022, 49(9): 202-207. https://doi.org/10.11896/jsjkx.220300277
[2] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[3] 徐涌鑫, 赵俊峰, 王亚沙, 谢冰, 杨恺.
时序知识图谱表示学习
Temporal Knowledge Graph Representation Learning
计算机科学, 2022, 49(9): 162-171. https://doi.org/10.11896/jsjkx.220500204
[4] 王剑, 彭雨琦, 赵宇斐, 杨健.
基于深度学习的社交网络舆情信息抽取方法综述
Survey of Social Network Public Opinion Information Extraction Based on Deep Learning
计算机科学, 2022, 49(8): 279-293. https://doi.org/10.11896/jsjkx.220300099
[5] 黄松, 杜金虎, 王兴亚, 孙金磊.
以太坊智能合约模糊测试技术研究综述
Survey of Ethereum Smart Contract Fuzzing Technology Research
计算机科学, 2022, 49(8): 294-305. https://doi.org/10.11896/jsjkx.220500069
[6] 郝志荣, 陈龙, 黄嘉成.
面向文本分类的类别区分式通用对抗攻击方法
Class Discriminative Universal Adversarial Attack for Text Classification
计算机科学, 2022, 49(8): 323-329. https://doi.org/10.11896/jsjkx.220200077
[7] 姜梦函, 李邵梅, 郑洪浩, 张建朋.
基于改进位置编码的谣言检测模型
Rumor Detection Model Based on Improved Position Embedding
计算机科学, 2022, 49(8): 330-335. https://doi.org/10.11896/jsjkx.210600046
[8] 孙奇, 吉根林, 张杰.
基于非局部注意力生成对抗网络的视频异常事件检测方法
Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection
计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061
[9] 侯钰涛, 阿布都克力木·阿布力孜, 哈里旦木·阿布都克里木.
中文预训练模型研究进展
Advances in Chinese Pre-training Models
计算机科学, 2022, 49(7): 148-163. https://doi.org/10.11896/jsjkx.211200018
[10] 周慧, 施皓晨, 屠要峰, 黄圣君.
基于主动采样的深度鲁棒神经网络学习
Robust Deep Neural Network Learning Based on Active Sampling
计算机科学, 2022, 49(7): 164-169. https://doi.org/10.11896/jsjkx.210600044
[11] 苏丹宁, 曹桂涛, 王燕楠, 王宏, 任赫.
小样本雷达辐射源识别的深度学习方法综述
Survey of Deep Learning for Radar Emitter Identification Based on Small Sample
计算机科学, 2022, 49(7): 226-235. https://doi.org/10.11896/jsjkx.210600138
[12] 胡艳羽, 赵龙, 董祥军.
一种用于癌症分类的两阶段深度特征选择提取算法
Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification
计算机科学, 2022, 49(7): 73-78. https://doi.org/10.11896/jsjkx.210500092
[13] 程成, 降爱莲.
基于多路径特征提取的实时语义分割方法
Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction
计算机科学, 2022, 49(7): 120-126. https://doi.org/10.11896/jsjkx.210500157
[14] 祝文韬, 兰先超, 罗唤霖, 岳彬, 汪洋.
改进Faster R-CNN的光学遥感飞机目标检测
Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN
计算机科学, 2022, 49(6A): 378-383. https://doi.org/10.11896/jsjkx.210300121
[15] 王建明, 陈响育, 杨自忠, 史晨阳, 张宇航, 钱正坤.
不同数据增强方法对模型识别精度的影响
Influence of Different Data Augmentation Methods on Model Recognition Accuracy
计算机科学, 2022, 49(6A): 418-423. https://doi.org/10.11896/jsjkx.210700210
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!