Fuzz testing of industrial network protocols in programmable logic controllers

dc.contributor.advisorNguyen, Thuy D.
dc.contributor.advisorIrvine, Cynthia
dc.contributor.authorGormley, James J., III
dc.contributor.departmentInformation Sciences (IS)
dc.date.accessioned2018-02-07T20:37:23Z
dc.date.available2018-02-07T20:37:23Z
dc.date.issued2017-12
dc.description.abstractDaily operations of U.S. Navy afloat and ashore systems are heavily reliant on industrial control systems (ICSs) to manage critical infrastructure services. Programmable logic controllers (PLCs) are vital components in these cyber-physical systems. The industrial network protocols used to communicate between nodes in a control network are complex and vulnerable to a myriad of cyber attacks, as reported by Department of Homeland Security Industrial Control Systems Cyber Emergency Response Team. This thesis utilizes protocol fuzz testing techniques to investigate potential vulnerabilities in the Allen-Bradley/Rockwell Automation (AB/RA) MicroLogix 1100 PLC through its implementation of EtherNet/IP, Common Industrial Protocol (CIP), and Programmable Controller Communication Commands (PCCC) communication protocols. This research also examines whether cross-generational vulnerabilities exist in the more advanced AB/RA ControlLogix 1756-L71 PLC. Our results discover several deviations from the EtherNet/IP and PCCC specifications in the MicroLogix 1100 implementation of these protocols. Additionally, we find that a recently disclosed denial-of-service vulnerability that renders the MicroLogix 1100 inoperable does not trigger a similar fault condition in the ControlLogix PLC.en_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.
dc.description.serviceLieutenant Commander, United States Navyen_US
dc.description.urihttp://archive.org/details/fuzztestingofind1094556926
dc.identifier.urihttps://hdl.handle.net/10945/56926
dc.publisherMonterey, CA; Naval Postgraduate School
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.subject.authorindustrial control systemen_US
dc.subject.authorprotocol fuzz testingen_US
dc.subject.authorPLCen_US
dc.subject.authorEtherNet/IPen_US
dc.subject.authorCIPen_US
dc.subject.authorPCCCen_US
dc.subject.authorMicroLogixen_US
dc.subject.authorControlLogixen_US
dc.titleFuzz testing of industrial network protocols in programmable logic controllersen_US
dc.typeThesisen_US
dspace.entity.typePublication
etd.thesisdegree.disciplineCyber Systems and Operationsen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.nameMaster of Science in Cyber Systems and Operationsen_US
relation.isDepartmentOfPublication74f4d405-0bff-4b6e-9446-edae3a8b11bb
relation.isDepartmentOfPublication.latestForDiscovery74f4d405-0bff-4b6e-9446-edae3a8b11bb
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
17Dec_Gormley_James.pdf
Size:
18.92 MB
Format:
Adobe Portable Document Format
Collections