计算机科学 ›› 2022, Vol. 49 ›› Issue (10): 310-318.doi: 10.11896/jsjkx.210700248
王田原, 武淑红, 李兆基, 辛昊光, 李璇, 陈永乐
WANG Tian-yuan, WU Shu-hong, LI Zhao-ji, XIN Hao-guang, LI Xuan, CHEN Yong-le
摘要: 工业安全问题一直是重要而紧迫的全球性问题,工控协议被广泛应用于工业控制系统(Industrial Control System,ICS)组件之间的通信,其安全性关系到整个系统的安全稳定运行,迫切需要保证所有工控协议的安全。网络协议模糊测试对保证ICS的安全性和可靠性起着重要的作用,传统的模糊测试方法提高了工控协议的安全性,其中许多方法具有实际应用价值。然而,传统的模糊测试方法严重依赖于工控协议的规范,使得测试过程昂贵、耗时、麻烦和枯燥,如果规范不存在,任务就很难进行。因此,文中提出了一种基于指针生成网络(Pointer-Generator Networks,PGN)的智能且自动的协议模糊测试方法,并给出了一系列的性能指标。在此基础之上,设计了一个自动化智能应用模糊测试框架PGNFuzz,可用于各种工业控制协议。采用Modbus和EtherCAT等几种典型的工控协议对该框架的有效性和效率进行测试,实验结果表明,该方法在便捷性、有效性和效率方面均优于其他通用型模糊器(General Purpose Fuzzer,GPF)和其他基于深度学习的模糊测试方法。
中图分类号:
[1]KIM S K,KOPPEN M ,BASHIR A K,et al.Advanced ICT andIOT Technologies for the fourth Industrial Revolution [J].Intelligent Automation & Soft Computing,2020,26(1):83-85. [2]WAN M,LI J,LIU Y,et al.Characteristic insights on industrial cyber security and popular defense mechanisms [J].China Communications,2021,18(1):130-150. [3]MILLER B P,FREDRIKSEN L,SO B,et al.An empirical study of the reliability of UNIX utilities[J].Communications of the ACM,1990,33(12):32-44. [4]RAULI K,MARKO L,ARI T.Software security assessmentthrough specification mutations and fault injection [C]//Communications and Multimedia Security Issues of the New Century.New York:Springer,2001:173-183. [5]GREG B,MARCO C,VIKTORIA F.Snooze:toward a stateful network protocol fuzzer [C]//International Conference on Information Security.New York:ACM,2006:343-358. [6]DEVARAJAN G.Unraveling SCADA protocols:using sulleyfuzzer,presented at the DefCon 15 Hacking conference [EB/OL].http://www.defcon.org/html/defcon-15/de-15-speakers.html. [7]VOVIATZIS A G,KATSIGIANNIS K,KOUBIAS S.A Mod-bus/TCP Fuzzer for testing internetworked industrial systems[C]//2015 IEEE 20th Conference on Emerging Technologies & Factory Automation(ETFA).IEEE,2015. [8]HU Z C,SHI J Q,HUANG Y H,et al.GANFuzz:A Gan-basedindustrial network protocol fuzzing framework [C]//The 15th ACM International Conference,Computing.Frontiers.New York:ACM,2018:138-145. [9]LI Z H,ZHAO H,SHI J Q,et al.An Intelligent Fuzzing Data Generation Method Based on Deep Adversarial Learning [J].IEEE Access,2019,7:49327-49340. [10]ZHAO H,LI Z H,WEI H S,et al.SeqFuzzer:An IndustrialProtocol Fuzzing Framework from a Deep Learning Perspective [C]//2019 12th IEEE Conference on Software Testing,Validation and Verification.Xi'an,China:ICST,2019:59-67. [11]TU Z P,LU Z D,LIU Y,et al.Modeling coverage for neural machine translation [C]//Proceedings of the 54th Annual Mee-ting of the Association for Computational Linguistics.Berlin:ACL,2016:76-85. [12]GODEFROID P,PELEG H,SINGH R.Learn&fuzz:Machinelearning for input fuzzing [C]//Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering.Urbana:IEEE Press,2017:50-59. [13]RAJPAL M,BLUM W,SINGH R.Not all bytes are equal:Neural byte sieve for fuzzing [EB/OL].https://arxiv.org/abs/1711.04596. [14]NICHOLS N,RAUGAS M,JASPER R,et al.Faster fuzzing:Reinitialization with deep neural models [EB/OL].https://ar-xiv.org/abs/1711.02807. [15]FAN R,CHANG Y.Machine learning for black- box fuzzing of network protocols [C]//International Conference on Information and Communications Security.Beijing:ICICS,2017:621-632. [16]JUSTIN S,JUAN P B.Deep convolutional neural networks and data augmentation for environmental sound classification [J].IEEE Signal Process Letters,2017,44(3):279-283. [17]LEVY O,GOLDBERG Y.Neural word embedding as implicit matrix factorization [C]//Proceedings of the 28th International Conference on Neural Information Processing Systems.Mon-treal:NIPS,2014:2177-2185. [18]DZMITRY B,KYUNGHYUN C,YOSHUA B.Neural Machine Translation by Jointly Learning to Align and Translate [C]//3rd International Conference on Learning Representations.San Diego:ICLR,2017. [19]ORIOL V,MEIRE F,NAVDEEP J.Pointer networks [C]//Proceedings of the 29th International Conference on Neural Information Processing Systems.Montreal:NIPS,2015. [20]DAI A M,LE Q V.Semi-supervised sequence learning [C]//Proceedings of the 28th International Conference on Neural Information Processing Systems.Montreal:NIPS,2014:3079-3087. [21]KINGMA D,BA J.ADAM:A method for stochastic optimization [C]//the 3rd International Conference for Learning Representations.San Diego:ICLR,2015. [22]DODDINGTON G.Automatic evaluation of machine translation quality using n-gram co-occurrence statistics [C]//Proceedings of the Second International Conference on Human Language Technology Research.San Francisco:HLT,2002:138-145. [23]ROBERTS JR JD,IHNAT J,SMITH JR W.Microprogrammed control unit(MCU) programming reference manual [C]//ACM Sigmicro Newsletter.1972:18-57. [24]FENG Z L,YU J X.Design and implementation of rs485 bus communication protocol [J].Computer Engineering,2012,38(20):215-218. |
[1] | 饶志双, 贾真, 张凡, 李天瑞. 基于Key-Value关联记忆网络的知识图谱问答方法 Key-Value Relational Memory Networks for Question Answering over Knowledge Graph 计算机科学, 2022, 49(9): 202-207. https://doi.org/10.11896/jsjkx.220300277 |
[2] | 汤凌韬, 王迪, 张鲁飞, 刘盛云. 基于安全多方计算和差分隐私的联邦学习方案 Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy 计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108 |
[3] | 徐涌鑫, 赵俊峰, 王亚沙, 谢冰, 杨恺. 时序知识图谱表示学习 Temporal Knowledge Graph Representation Learning 计算机科学, 2022, 49(9): 162-171. https://doi.org/10.11896/jsjkx.220500204 |
[4] | 王剑, 彭雨琦, 赵宇斐, 杨健. 基于深度学习的社交网络舆情信息抽取方法综述 Survey of Social Network Public Opinion Information Extraction Based on Deep Learning 计算机科学, 2022, 49(8): 279-293. https://doi.org/10.11896/jsjkx.220300099 |
[5] | 黄松, 杜金虎, 王兴亚, 孙金磊. 以太坊智能合约模糊测试技术研究综述 Survey of Ethereum Smart Contract Fuzzing Technology Research 计算机科学, 2022, 49(8): 294-305. https://doi.org/10.11896/jsjkx.220500069 |
[6] | 郝志荣, 陈龙, 黄嘉成. 面向文本分类的类别区分式通用对抗攻击方法 Class Discriminative Universal Adversarial Attack for Text Classification 计算机科学, 2022, 49(8): 323-329. https://doi.org/10.11896/jsjkx.220200077 |
[7] | 姜梦函, 李邵梅, 郑洪浩, 张建朋. 基于改进位置编码的谣言检测模型 Rumor Detection Model Based on Improved Position Embedding 计算机科学, 2022, 49(8): 330-335. https://doi.org/10.11896/jsjkx.210600046 |
[8] | 孙奇, 吉根林, 张杰. 基于非局部注意力生成对抗网络的视频异常事件检测方法 Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection 计算机科学, 2022, 49(8): 172-177. https://doi.org/10.11896/jsjkx.210600061 |
[9] | 侯钰涛, 阿布都克力木·阿布力孜, 哈里旦木·阿布都克里木. 中文预训练模型研究进展 Advances in Chinese Pre-training Models 计算机科学, 2022, 49(7): 148-163. https://doi.org/10.11896/jsjkx.211200018 |
[10] | 周慧, 施皓晨, 屠要峰, 黄圣君. 基于主动采样的深度鲁棒神经网络学习 Robust Deep Neural Network Learning Based on Active Sampling 计算机科学, 2022, 49(7): 164-169. https://doi.org/10.11896/jsjkx.210600044 |
[11] | 苏丹宁, 曹桂涛, 王燕楠, 王宏, 任赫. 小样本雷达辐射源识别的深度学习方法综述 Survey of Deep Learning for Radar Emitter Identification Based on Small Sample 计算机科学, 2022, 49(7): 226-235. https://doi.org/10.11896/jsjkx.210600138 |
[12] | 胡艳羽, 赵龙, 董祥军. 一种用于癌症分类的两阶段深度特征选择提取算法 Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification 计算机科学, 2022, 49(7): 73-78. https://doi.org/10.11896/jsjkx.210500092 |
[13] | 程成, 降爱莲. 基于多路径特征提取的实时语义分割方法 Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction 计算机科学, 2022, 49(7): 120-126. https://doi.org/10.11896/jsjkx.210500157 |
[14] | 祝文韬, 兰先超, 罗唤霖, 岳彬, 汪洋. 改进Faster R-CNN的光学遥感飞机目标检测 Remote Sensing Aircraft Target Detection Based on Improved Faster R-CNN 计算机科学, 2022, 49(6A): 378-383. https://doi.org/10.11896/jsjkx.210300121 |
[15] | 王建明, 陈响育, 杨自忠, 史晨阳, 张宇航, 钱正坤. 不同数据增强方法对模型识别精度的影响 Influence of Different Data Augmentation Methods on Model Recognition Accuracy 计算机科学, 2022, 49(6A): 418-423. https://doi.org/10.11896/jsjkx.210700210 |
|