Survey on industrial control protocol security research

The security of industrial control protocol is the cornerstone to ensure ICS’s stable operation, a large number of industrial control protocols in the design phase ignore the consideration of security, resulting in most of the mainstream industrial control protocols generally having vulnerabilities....

Full description

Saved in:
Bibliographic Details
Main Authors: HUANG Tao, WANG Zhiwei, LIU Jiachi, LONG Qianxi, KUANG Boyu, FU Anmin, ZHANG Yuqing
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2024-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024104/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539198380670976
author HUANG Tao
WANG Zhiwei
LIU Jiachi
LONG Qianxi
KUANG Boyu
FU Anmin
ZHANG Yuqing
author_facet HUANG Tao
WANG Zhiwei
LIU Jiachi
LONG Qianxi
KUANG Boyu
FU Anmin
ZHANG Yuqing
author_sort HUANG Tao
collection DOAJ
description The security of industrial control protocol is the cornerstone to ensure ICS’s stable operation, a large number of industrial control protocols in the design phase ignore the consideration of security, resulting in most of the mainstream industrial control protocols generally having vulnerabilities. Considering the ICS architecture and the developmental characteristics of industrial control protocols, the various vulnerabilities and attack threats commonly faced by industrial control protocols were systematically summarized. At the same time, for the unknown potential vulnerabilities of industrial control protocols, the vulnerability mining techniques of industrial control protocols were analyzed in-depth, including the static symbolic execution-based, code audit-based, and fuzzing-based. The protocol design security protection technology was comprehensively dissected from the three directions of industrial control protocol specification design, communication mechanism, and third-party middleware. In addition, the future development trend of industrial control protocol security was further prospected from the aspects of sandbox development, security protection, and vulnerability mining.
format Article
id doaj-art-63e7e65e519a4ae19c6408eddf95fc08
institution Kabale University
issn 1000-436X
language zho
publishDate 2024-06-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-63e7e65e519a4ae19c6408eddf95fc082025-01-14T07:24:33ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2024-06-0145607463977303Survey on industrial control protocol security researchHUANG TaoWANG ZhiweiLIU JiachiLONG QianxiKUANG BoyuFU AnminZHANG YuqingThe security of industrial control protocol is the cornerstone to ensure ICS’s stable operation, a large number of industrial control protocols in the design phase ignore the consideration of security, resulting in most of the mainstream industrial control protocols generally having vulnerabilities. Considering the ICS architecture and the developmental characteristics of industrial control protocols, the various vulnerabilities and attack threats commonly faced by industrial control protocols were systematically summarized. At the same time, for the unknown potential vulnerabilities of industrial control protocols, the vulnerability mining techniques of industrial control protocols were analyzed in-depth, including the static symbolic execution-based, code audit-based, and fuzzing-based. The protocol design security protection technology was comprehensively dissected from the three directions of industrial control protocol specification design, communication mechanism, and third-party middleware. In addition, the future development trend of industrial control protocol security was further prospected from the aspects of sandbox development, security protection, and vulnerability mining.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024104/ICSindustrial control protocolprotocol vulnerabilitysecurity protectionvulnerability mining
spellingShingle HUANG Tao
WANG Zhiwei
LIU Jiachi
LONG Qianxi
KUANG Boyu
FU Anmin
ZHANG Yuqing
Survey on industrial control protocol security research
Tongxin xuebao
ICS
industrial control protocol
protocol vulnerability
security protection
vulnerability mining
title Survey on industrial control protocol security research
title_full Survey on industrial control protocol security research
title_fullStr Survey on industrial control protocol security research
title_full_unstemmed Survey on industrial control protocol security research
title_short Survey on industrial control protocol security research
title_sort survey on industrial control protocol security research
topic ICS
industrial control protocol
protocol vulnerability
security protection
vulnerability mining
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2024104/
work_keys_str_mv AT huangtao surveyonindustrialcontrolprotocolsecurityresearch
AT wangzhiwei surveyonindustrialcontrolprotocolsecurityresearch
AT liujiachi surveyonindustrialcontrolprotocolsecurityresearch
AT longqianxi surveyonindustrialcontrolprotocolsecurityresearch
AT kuangboyu surveyonindustrialcontrolprotocolsecurityresearch
AT fuanmin surveyonindustrialcontrolprotocolsecurityresearch
AT zhangyuqing surveyonindustrialcontrolprotocolsecurityresearch