Survey on Industrial Control Protocol Security Research

HUANG Tao,WANG Zhiwei,LIU Jiachi,LONG Qianxi,KUANG Boyu,FU Anmin,ZHANG Yuqing
DOI: https://doi.org/10.11959/j.issn.1000-436x.2024104
2024-01-01
Abstract:The security of industrial control protocol is the cornerstone to ensure ICS's stable operation,a large number of industrial control protocols in the design phase ignore the consideration of security,resulting in most of the main-stream industrial control protocols generally having vulnerabilities.Considering the ICS architecture and the develop-mental characteristics of industrial control protocols,the various vulnerabilities and attack threats commonly faced by in-dustrial control protocols were systematically summarized.At the same time,for the unknown potential vulnerabilities of industrial control protocols,the vulnerability mining techniques of industrial control protocols were analyzed in-depth,including the static symbolic execution-based,code audit-based,and fuzzing-based.The protocol design security protec-tion technology was comprehensively dissected from the three directions of industrial control protocol specification de-sign,communication mechanism,and third-party middleware.In addition,the future development trend of industrial con-trol protocol security was further prospected from the aspects of sandbox development,security protection,and vulner-ability mining.
What problem does this paper attempt to address?