Vulnerability mining method for the modbus TCP using an anti-sample fuzzer

24Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.

Abstract

Vulnerability mining technology is used for protecting the security of industrial control systems and their network protocols. Traditionally, vulnerability mining methods have the shortcomings of poor vulnerability mining ability and low reception rate. In this study, a test case generation model for vulnerability mining of the Modbus TCP based on an anti-sample algorithm is proposed. Firstly, a recurrent neural network is trained to learn the semantics of the protocol data unit. The softmax function is used to express the probability distribution of data values. Next, the random variable threshold and the maximum probability are compared in the algorithm to determine whether to replace the current data value with the minimum probability data value. Finally, the Modbus application protocol (MBAP) header is completed according to the protocol specification. Experiments using the anti-sample fuzzer show that it not only improves the reception rate of test cases and the ability to exploit vulnerabilities, but also detects vulnerabilities of industrial control protocols more quickly.

Cite

CITATION STYLE

APA

Lai, Y., Gao, H., & Liu, J. (2020). Vulnerability mining method for the modbus TCP using an anti-sample fuzzer. Sensors (Switzerland), 20(7). https://doi.org/10.3390/s20072040

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free