• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

利用反样本模糊测试器的 Modbus TCP 漏洞挖掘方法。

Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer.

机构信息

College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China.

出版信息

Sensors (Basel). 2020 Apr 5;20(7):2040. doi: 10.3390/s20072040.

DOI:10.3390/s20072040
PMID:32260503
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC7180888/
Abstract

Vulnerability mining technology is used for protecting the security of industrial control systems and their network protocols. Traditionally, vulnerability mining methods have the shortcomings of poor vulnerability mining ability and low reception rate. In this study, a test case generation model for vulnerability mining of the Modbus TCP based on an anti-sample algorithm is proposed. Firstly, a recurrent neural network is trained to learn the semantics of the protocol data unit. The softmax function is used to express the probability distribution of data values. Next, the random variable threshold and the maximum probability are compared in the algorithm to determine whether to replace the current data value with the minimum probability data value. Finally, the Modbus application protocol (MBAP) header is completed according to the protocol specification. Experiments using the anti-sample fuzzer show that it not only improves the reception rate of test cases and the ability to exploit vulnerabilities, but also detects vulnerabilities of industrial control protocols more quickly.

摘要

漏洞挖掘技术用于保护工业控制系统及其网络协议的安全。传统的漏洞挖掘方法存在漏洞挖掘能力差、接收率低的缺点。本研究提出了一种基于反样本算法的 Modbus TCP 漏洞挖掘测试用例生成模型。首先,训练一个递归神经网络来学习协议数据单元的语义。使用 softmax 函数来表示数据值的概率分布。然后,在算法中比较随机变量阈值和最大概率,以确定是否用最小概率数据值替换当前数据值。最后,根据协议规范完成 Modbus 应用协议 (MBAP) 头。使用反样本模糊测试的实验表明,它不仅提高了测试用例的接收率和漏洞利用能力,而且能够更快地检测工业控制协议的漏洞。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aa76/7180888/d868da9f5b49/sensors-20-02040-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aa76/7180888/6a4e3f67fa17/sensors-20-02040-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aa76/7180888/7ab22ada9ab6/sensors-20-02040-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aa76/7180888/d1633829a367/sensors-20-02040-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aa76/7180888/d868da9f5b49/sensors-20-02040-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aa76/7180888/6a4e3f67fa17/sensors-20-02040-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aa76/7180888/7ab22ada9ab6/sensors-20-02040-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aa76/7180888/d1633829a367/sensors-20-02040-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/aa76/7180888/d868da9f5b49/sensors-20-02040-g008.jpg

相似文献

1
Vulnerability Mining Method for the Modbus TCP Using an Anti-Sample Fuzzer.利用反样本模糊测试器的 Modbus TCP 漏洞挖掘方法。
Sensors (Basel). 2020 Apr 5;20(7):2040. doi: 10.3390/s20072040.
2
A Role-Based Access Control Model in Modbus SCADA Systems. A Centralized Model Approach.基于角色的访问控制模型在 Modbus SCADA 系统中的应用。一种集中式模型方法。
Sensors (Basel). 2019 Oct 14;19(20):4455. doi: 10.3390/s19204455.
3
TTAS: Trusted Token Authentication Service of Securing SCADA Network in Energy Management System for Industrial Internet of Things.TTAS:工业物联网能源管理系统中保障SCADA网络安全的可信令牌认证服务
Sensors (Basel). 2021 Apr 11;21(8):2685. doi: 10.3390/s21082685.
4
Cryptographic Considerations for Automation and SCADA Systems Using Trusted Platform Modules.使用可信平台模块的自动化和监控与数据采集系统的加密注意事项。
Sensors (Basel). 2019 Sep 27;19(19):4191. doi: 10.3390/s19194191.
5
Modbus Extension Server Implementation for BIoT-Enabled Smart Switch Embedded System Device.用于支持物联网的智能开关嵌入式系统设备的Modbus扩展服务器实现
Sensors (Basel). 2024 Jan 12;24(2):475. doi: 10.3390/s24020475.
6
Experimental Implementation and Performance Evaluation of an IoT Access Gateway for the Modbus Extension.用于Modbus扩展的物联网接入网关的实验实现与性能评估
Sensors (Basel). 2021 Jan 1;21(1):246. doi: 10.3390/s21010246.
7
Automated Vulnerability Discovery and Exploitation in the Internet of Things.物联网中的自动化漏洞发现与利用
Sensors (Basel). 2019 Jul 31;19(15):3362. doi: 10.3390/s19153362.
8
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.基于网络流量分析和二进制逆向工程的协议漏洞检测
PLoS One. 2017 Oct 19;12(10):e0186188. doi: 10.1371/journal.pone.0186188. eCollection 2017.
9
ARIES: A Novel Multivariate Intrusion Detection System for Smart Grid.ARIES:一种用于智能电网的新型多元入侵检测系统。
Sensors (Basel). 2020 Sep 16;20(18):5305. doi: 10.3390/s20185305.
10
An approach of vulnerability testing for third-party component based on condition and parameter mutation.一种基于条件和参数变异的第三方组件漏洞测试方法。
ScientificWorldJournal. 2013 Sep 8;2013:609254. doi: 10.1155/2013/609254. eCollection 2013.

引用本文的文献

1
Experimental Implementation and Performance Evaluation of an IoT Access Gateway for the Modbus Extension.用于Modbus扩展的物联网接入网关的实验实现与性能评估
Sensors (Basel). 2021 Jan 1;21(1):246. doi: 10.3390/s21010246.
2
A systematic review of fuzzing based on machine learning techniques.基于机器学习技术的模糊测试系统综述。
PLoS One. 2020 Aug 18;15(8):e0237749. doi: 10.1371/journal.pone.0237749. eCollection 2020.
3
The Design of Large Scale IP Address and Port Scanning Tool.大规模IP地址与端口扫描工具的设计

本文引用的文献

1
Prediction of pH Value by Multi-Classification in the Weizhou Island Area.多分类法在涠洲岛地区 pH 值预测中的应用。
Sensors (Basel). 2019 Sep 8;19(18):3875. doi: 10.3390/s19183875.
Sensors (Basel). 2020 Aug 8;20(16):4423. doi: 10.3390/s20164423.