Survey on industrial control protocol security research
The security of industrial control protocol is the cornerstone to ensure ICS’s stable operation, a large number of industrial control protocols in the design phase ignore the consideration of security, resulting in most of the mainstream industrial control protocols generally having vulnerabilities....
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2024-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024104/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539198380670976 |
---|---|
author | HUANG Tao WANG Zhiwei LIU Jiachi LONG Qianxi KUANG Boyu FU Anmin ZHANG Yuqing |
author_facet | HUANG Tao WANG Zhiwei LIU Jiachi LONG Qianxi KUANG Boyu FU Anmin ZHANG Yuqing |
author_sort | HUANG Tao |
collection | DOAJ |
description | The security of industrial control protocol is the cornerstone to ensure ICS’s stable operation, a large number of industrial control protocols in the design phase ignore the consideration of security, resulting in most of the mainstream industrial control protocols generally having vulnerabilities. Considering the ICS architecture and the developmental characteristics of industrial control protocols, the various vulnerabilities and attack threats commonly faced by industrial control protocols were systematically summarized. At the same time, for the unknown potential vulnerabilities of industrial control protocols, the vulnerability mining techniques of industrial control protocols were analyzed in-depth, including the static symbolic execution-based, code audit-based, and fuzzing-based. The protocol design security protection technology was comprehensively dissected from the three directions of industrial control protocol specification design, communication mechanism, and third-party middleware. In addition, the future development trend of industrial control protocol security was further prospected from the aspects of sandbox development, security protection, and vulnerability mining. |
format | Article |
id | doaj-art-63e7e65e519a4ae19c6408eddf95fc08 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2024-06-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-63e7e65e519a4ae19c6408eddf95fc082025-01-14T07:24:33ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-06-0145607463977303Survey on industrial control protocol security researchHUANG TaoWANG ZhiweiLIU JiachiLONG QianxiKUANG BoyuFU AnminZHANG YuqingThe security of industrial control protocol is the cornerstone to ensure ICS’s stable operation, a large number of industrial control protocols in the design phase ignore the consideration of security, resulting in most of the mainstream industrial control protocols generally having vulnerabilities. Considering the ICS architecture and the developmental characteristics of industrial control protocols, the various vulnerabilities and attack threats commonly faced by industrial control protocols were systematically summarized. At the same time, for the unknown potential vulnerabilities of industrial control protocols, the vulnerability mining techniques of industrial control protocols were analyzed in-depth, including the static symbolic execution-based, code audit-based, and fuzzing-based. The protocol design security protection technology was comprehensively dissected from the three directions of industrial control protocol specification design, communication mechanism, and third-party middleware. In addition, the future development trend of industrial control protocol security was further prospected from the aspects of sandbox development, security protection, and vulnerability mining.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024104/ICSindustrial control protocolprotocol vulnerabilitysecurity protectionvulnerability mining |
spellingShingle | HUANG Tao WANG Zhiwei LIU Jiachi LONG Qianxi KUANG Boyu FU Anmin ZHANG Yuqing Survey on industrial control protocol security research Tongxin xuebao ICS industrial control protocol protocol vulnerability security protection vulnerability mining |
title | Survey on industrial control protocol security research |
title_full | Survey on industrial control protocol security research |
title_fullStr | Survey on industrial control protocol security research |
title_full_unstemmed | Survey on industrial control protocol security research |
title_short | Survey on industrial control protocol security research |
title_sort | survey on industrial control protocol security research |
topic | ICS industrial control protocol protocol vulnerability security protection vulnerability mining |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024104/ |
work_keys_str_mv | AT huangtao surveyonindustrialcontrolprotocolsecurityresearch AT wangzhiwei surveyonindustrialcontrolprotocolsecurityresearch AT liujiachi surveyonindustrialcontrolprotocolsecurityresearch AT longqianxi surveyonindustrialcontrolprotocolsecurityresearch AT kuangboyu surveyonindustrialcontrolprotocolsecurityresearch AT fuanmin surveyonindustrialcontrolprotocolsecurityresearch AT zhangyuqing surveyonindustrialcontrolprotocolsecurityresearch |