中国电力 ›› 2022, Vol. 55 ›› Issue (4): 33-43.DOI: 10.11930/j.issn.1004-9649.202109105

• 新型电力系统信息安全:理论、技术与应用 • 上一篇    下一篇

基于模糊测试的GOOSE协议解析漏洞挖掘方法

刘林彬1, 苗泉强2, 李俊娥1   

  1. 1. 空天信息安全与可信计算教育部重点实验室(武汉大学 国家网络安全学院),湖北 武汉 430072;
    2. 光电对抗测试评估技术重点实验室,河南 洛阳 471000
  • 收稿日期:2021-09-18 修回日期:2022-02-09 出版日期:2022-04-28 发布日期:2022-04-24
  • 作者简介:刘林彬(1996—),男,硕士研究生,从事电力工控系统安全研究,E-mail:linbinl@whu.edu.cn;苗泉强(1989—),男,工程师,硕士,从事网络安全、大数据处理研究,E-mail:miaoquanqiang@163.com;李俊娥(1966—),女,通信作者,教授,博士生导师,从事网络安全、电信息物理系统、电力工控安全等研究,E-mail:jeli@whu.edu.cn
  • 基金资助:
    国家自然科学基金资助项目(协同网络攻击下电网CPS跨空间级联故障演化机理及早期防御研究,51977155)。

A Method for Mining GOOSE Protocol Parsing Vulnerabilities Based on Fuzzing

LIU Linbin1, MIAO Quanqiang2, LI June1   

  1. 1. Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education (School of Cyber Science and Engineering, Wuhan University), Wuhan 430072, China;
    2. Key Laboratory of Electro-optical Countermeasures Test & Evaluation Technology, Luoyang 471000, China
  • Received:2021-09-18 Revised:2022-02-09 Online:2022-04-28 Published:2022-04-24
  • Supported by:
    This work is supported by National Natural Science Foundation of China (Research on the Evolution Mechanism and Early Defense of Cascading Failures Across Spaces Caused by Coordinated Cyberattacks in Grid CPS, No.51977155)

摘要: 现有工控协议模糊测试方法未考虑嵌入式终端系统特点,且对未采用传输控制协议/网际协议(TCP/IP)的工控协议研究较少。基于模糊测试提出一种通用面向对象变电站事件(GOOSE)协议解析漏洞挖掘方法。使用变异方式构造测试用例,给出基于GOOSE报文字段类型、抽象语法标记1(ASN.1)编码方式和比特翻转的3类变异策略;提出基于心跳报文和系统运行信息的终端异常监测方法。设计所提方法的实施系统架构和测试流程,在智能变电站实验室环境中,对某厂家嵌入式终端进行测试,发现2个未公开的GOOSE协议解析漏洞,验证所提方法的有效性,提出防范基于此类漏洞的畸形报文攻击的建议。

关键词: 模糊测试, GOOSE协议, 电网嵌入式终端, 漏洞挖掘, 畸形报文攻击

Abstract: The existing fuzzing methods for industrial control protocol do not consider the characteristics of the embedded terminal systems, and have few research on the industrial control protocol without TCP/IP. Firstly, a fuzzing-based method for mining generic object-oriented substation event (GOOSE) protocol parsing vulnerabilities is proposed: the mutation mode is used to generate test cases, and three mutation strategies are presented based on GOOSE message field type, abstract syntax notation one (ASN.1) encoding mode and bit reversal; two terminal abnormalities monitoring methods are proposed based on GOOSE heartbeat message and system operation information. Then, the implementation system architecture and test process of the proposed method are designed. Two undisclosed GOOSE protocol parsing vulnerabilities are discovered in testing the embedded terminals of a manufacturer in a smart substation laboratory environment, which verifies the effectiveness of the proposed method. Finally, recommendations for preventing malformed message attacks are put forward based on such vulnerabilities.

Key words: fuzzing, GOOSE protocol, grid embedded terminal, vulnerability mining, malformed message attack