{"title":"基于网络协议模糊的网络物理系统鲁棒性评估","authors":"T. Ananda, Gitanjali Simran T, S. T, S. D, R. P.","doi":"10.1109/ICACCE46606.2019.9079995","DOIUrl":null,"url":null,"abstract":"With the technological explosion of Internet of Things(IoT) and the conception of every particle being tied to the Internet, the “security” of these globally connected nodes is critical. The availability and reliability of these networked nodes can be guaranteed by securing the physical nodes and the data associated with them but more importantly by ensuring the network security associated with their communication stack. Thus, in this paper we evaluate the security robustness of the Network protocols associated with these networking capable devices through Fuzzing or corner case checks. Through the Fuzz assessments, we can assess the node behavior when the various applications are under fuzz and establish the security damage/robustness associated with it. This supplies a point of node vulnerability to be fixed before the node connects with a global network.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Robustness Evaluation of Cyber Physical Systems through Network Protocol Fuzzing\",\"authors\":\"T. Ananda, Gitanjali Simran T, S. T, S. D, R. P.\",\"doi\":\"10.1109/ICACCE46606.2019.9079995\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the technological explosion of Internet of Things(IoT) and the conception of every particle being tied to the Internet, the “security” of these globally connected nodes is critical. The availability and reliability of these networked nodes can be guaranteed by securing the physical nodes and the data associated with them but more importantly by ensuring the network security associated with their communication stack. Thus, in this paper we evaluate the security robustness of the Network protocols associated with these networking capable devices through Fuzzing or corner case checks. Through the Fuzz assessments, we can assess the node behavior when the various applications are under fuzz and establish the security damage/robustness associated with it. This supplies a point of node vulnerability to be fixed before the node connects with a global network.\",\"PeriodicalId\":317123,\"journal\":{\"name\":\"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICACCE46606.2019.9079995\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCE46606.2019.9079995","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Robustness Evaluation of Cyber Physical Systems through Network Protocol Fuzzing
With the technological explosion of Internet of Things(IoT) and the conception of every particle being tied to the Internet, the “security” of these globally connected nodes is critical. The availability and reliability of these networked nodes can be guaranteed by securing the physical nodes and the data associated with them but more importantly by ensuring the network security associated with their communication stack. Thus, in this paper we evaluate the security robustness of the Network protocols associated with these networking capable devices through Fuzzing or corner case checks. Through the Fuzz assessments, we can assess the node behavior when the various applications are under fuzz and establish the security damage/robustness associated with it. This supplies a point of node vulnerability to be fixed before the node connects with a global network.