Font Size: a A A

The Study Of Indstrial Control System Device Vulnerability Discovery

Posted on:2016-08-17Degree:MasterType:Thesis
Country:ChinaCandidate:C Q YuFull Text:PDF
GTID:2298330467993152Subject:Information security
Abstract/Summary:PDF Full Text Request
Industrial control system is an important part of the national critical infrastructure, and its security related to the safety of people’s life and property and the security of the country’s economic development. In recent years, industrial control system vulnerabilities and security incidents continue to occur, causing a serious threat to the country and the people.Vulnerability discovery is the focus of security research. Once the vulnerability was discovered and exploited by evil attacker, the consequence is beyond imagination. Discovered vulnerabilities before the security incidents happened and fixed it has important significance for the protection of industrial control system. This paper researches on the vulnerability discovery around single control equipment, including:(1)Study the characteristics of industrial control system. Statistical analyze of industrial control system of the open vulnerabilities, to understand the development trend of industrial control system vulnerabilities.(2)This paper proposes a new vulnerability discovery method for ICS terminal equipment. Fuzzing is the most commonly used method of vulnerability discovery, divided into test cases generated, mutation of test cases, fuzzer. Fuzzer is a tool which sends the mutated test cases to the target in order to discover vulnerability. The method uses industrial control programming data as sample source of test cases. Variation function realization based on genetic algorithm, has changed the original simple variation rules. With the help of industrial control memory fuzzy programming software, complete the design of in-memory fuzzer, so that it can adapt to ICS terminal equipment.(3)Based on the method of vulnerability discovery this essay improved, the ISC device-oriented system is developed. This system has improved the efficient to1/10.(4)Using the proposed approach for a typical industrial control device of vulnerability discovery, successfully discover a denial of service vulnerability. If an attacker find and exploit this vulnerability, the core control equipment of ICS will be down and cannot be recovered by reboot, thus the system will be paralyzed, damaged or exploded.
Keywords/Search Tags:ICS, Vulnerability Discovery, Fuzzing, Cyber Security
PDF Full Text Request
Related items