Font Size: a A A

Research On Penetration Testing Method Of Industrial Control Protocol Based On Mutation-Tree

Posted on:2021-04-05Degree:MasterType:Thesis
Country:ChinaCandidate:W X LiFull Text:PDF
GTID:2428330602479384Subject:Control theory and control engineering
Abstract/Summary:PDF Full Text Request
In recent years,the information security problems of industrial control systems has occurred frequently around the world,and the threat level of all kinds of attacks has risen to the national strategic level.With the continuous development of the two integration of informatization and industrialization,the self-sustaining closed industrial control system has been widely exposed to the Internet,while the industrial control system has almost no corresponding information security protection measures at the beginning of design,so that it faces many security risks in a short time,and has even caused extensive loss of life and property.Therefore,as far as the industrial control systems are concerned,proactively discovering potential vulnerabilities before malicious attacks are bound to become an important prerequisite to ensure the security of industrial control systems.Aiming at the existing or potential security vulnerabilities in the communication protocols of industrial control systems,this paper proposes the penetration test method of the industrial control protocol based on the mutation tree,and detects whether there are known or unknown protocol vulnerabilities in the communication proprietary protocol mounted on industrial equipment from the perspective of the endogenous security of the industrial control protocol.In turn,it provides effective solutions for the safety design and implementation of industrial control protocols.In this paper,the structure of mutation tree is used for the model description of the penetration test of the industrial control protocol.First of all,the industrial control protocol sample trees are constructed according to the agreement rules and protocol sequences and their structural relationships.Secondly,by analyzing the common industrial control vulnerabilities,the mutation factors are extracted and constructed to apply them to operate each node of the sample tree.At the same time,introduce field constraint priority conditions in the protocol agreement of the protocol under test to further control the degree of mutation of the attribute values of each node.Finally,high-quality test cases are generated.In other word,the effectiveness of test cases and the possibility of protocol vulnerabilities being discovered is improved,and this paper provides new ideas for the security test of the industrial control protocol.In order to verify the effectiveness of the mutation tree method,this paper takes Modbus TCP and DNP3 industrial control communication protocols as the targets to be tested,and then constructs,designs and implements the node mutation function set by sorting and analyzing the causes of the existing vulnerabilities in the protocol to be tested.Then the combined test cases are generated using mutation methods based on the constraint priority strategies,and the execution of test scripts to implement automated testing.For the monitoring and analysis of the test site,this paper uses the Wireshark network analysis tool for bypass monitoring,and uses the captured pcap file to further analysis the effectiveness of the test cases,test efficiency,number of abnormal test cases and abnormal response information,and compares the experimental results.This solution can effectively increase the effectiveness of test cases and the probability of discovering vulnerabilities.The experimental results show that using the mutation tree model to carry out industrial control protocol penetration testing can actively discover the security risks in industrial control protocols to a certain extent,and provide an important basis for the security construction of industrial control communication environments.
Keywords/Search Tags:Industrial control protocal, Penetration test, Mutation tree, Field constraint priority, Test cases
PDF Full Text Request
Related items