2020
DOI: 10.3390/s20072040
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer

Abstract: Vulnerability mining technology is used for protecting the security of industrial control systems and their network protocols. Traditionally, vulnerability mining methods have the shortcomings of poor vulnerability mining ability and low reception rate. In this study, a test case generation model for vulnerability mining of the Modbus TCP based on an anti-sample algorithm is proposed. Firstly, a recurrent neural network is trained to learn the semantics of the protocol data unit. The softmax function is used t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Due to its documentation being readily available and it being used by modern and legacy substations (which form a significant percentage of substations worldwide [99]), Modbus TCP [100]-which is the TCP variant of Modbus [101]-is used. Furthermore, reinforcing our selection is the fact that there is current literature that is centred around its security [102], vulnerabilities [103], attack mitigation [104,105], and utilization in testbeds [106,107]. Utilizing TCP port 502, its implementation requires a client-server architecture.…”
Section: Modbus Tcpmentioning
confidence: 97%
“…Due to its documentation being readily available and it being used by modern and legacy substations (which form a significant percentage of substations worldwide [99]), Modbus TCP [100]-which is the TCP variant of Modbus [101]-is used. Furthermore, reinforcing our selection is the fact that there is current literature that is centred around its security [102], vulnerabilities [103], attack mitigation [104,105], and utilization in testbeds [106,107]. Utilizing TCP port 502, its implementation requires a client-server architecture.…”
Section: Modbus Tcpmentioning
confidence: 97%
“…The most recent Modbus update dates back to 2012, and a new security specification appeared in Modbus TCP/IP in 2018. Scientific papers related to Modbus refer in particular to Modbus TCP/IP addressing issues related to the following, among others: use as a support for communication in distributed applications [ 4 ] (mostly SCADA [ 2 ]), the implementation of access gateways (for remote connection using a TCP/IP protocol stack [ 5 ] and wireless connection implementation [ 6 ]), security and authentication [ 7 ], the detection, simulation, and modeling of unwanted attacks, anomalies, and intrusions [ 8 ], vulnerabilities [ 9 , 10 ], software for integration into the OPC UA industrial middleware [ 11 ], performance analysis in the context of the complexity of the TCP/IP stack [ 12 ], and network traffic simulation [ 13 ].…”
Section: Related Workmentioning
confidence: 99%
“…studied the intrusion detection method based on PCA-BP neural network by using PCA to preprocess the data set, to accelerate the convergence speed and detection efficiency, but the effect of this method was not obvious in the detection of U2R and R2L attack types [2] . Y Lai, Gao, H. et al combined the intrusion detection method of whitelist filtering and neural network, and constantly improved the whitelist rule base according to the detection results of neural network to improve the detection rate of abnormal communication, but this method did not optimize the detection speed [3] . Nuraeni algorithm is designed to optimize OCSVM model parameters [4] .…”
Section: Introductionmentioning
confidence: 99%