A Holistic Review of Fuzzing for Vulnerability Assessment in Industrial Network Protocols

Industrial control systems (ICSs) are considered the backbone of the industry field due to their essential role in supervising and handling crucial manufacturing operations in critical infrastructures such as power grids, water supply systems, and manufacturing processes. ICS systems were not initia...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmed Reda Aldysty, Nour Moustafa, Erandi Lakshika
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Open Journal of the Communications Society
Subjects:
Online Access:https://ieeexplore.ieee.org/document/11002567/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850123803825274880
author Ahmed Reda Aldysty
Nour Moustafa
Erandi Lakshika
author_facet Ahmed Reda Aldysty
Nour Moustafa
Erandi Lakshika
author_sort Ahmed Reda Aldysty
collection DOAJ
description Industrial control systems (ICSs) are considered the backbone of the industry field due to their essential role in supervising and handling crucial manufacturing operations in critical infrastructures such as power grids, water supply systems, and manufacturing processes. ICS systems were not initially designed with robust security measures, making them vulnerable to potential attacks. Accordingly, these attacks can lead to severe consequences, including disrupting services, causing economic damage, and compromising public safety. Notably, the security of Industrial Control Systems depends on the robustness of Industrial Network Protocols (INPs). Therefore, exposing and addressing their vulnerabilities is essential to strengthening these critical infrastructures and proactively mitigating cyber threats. Fuzzing has emerged as a powerful technique for uncovering security flaws in network protocols by systematically generating malformed inputs to trigger unexpected behavior. In this paper, we address a critical area in industrial cybersecurity by examining recent advancements in fuzzing methods for industrial network protocols. Our work provides a comprehensive overview of the fuzzing process, identifies key vulnerabilities in INPs, especially within the widely used Modbus protocol, and highlights the need for more advanced fuzzing strategies. Thus, we present a systematic machine learning-based fuzzing framework tailored to the unique characteristics of industrial protocols, leveraging proven methodologies from existing literature. By evaluating the strengths and limitations of state-of-the-art approaches, we offer valuable insights into the key challenges associated with applying fuzzing to discover vulnerabilities in industrial protocols, such as maintaining message integrity, implementing intelligent log analysis, and addressing the lack of explainability in fuzzing outcomes. Crucially, we also explore how the capabilities of large language models (LLMs), including their comprehensive knowledge bases, contextual understanding, and knowledge consolidation, can be harnessed to overcome these challenges and enhance the effectiveness of fuzzing in industrial environments, which we demonstrate through a mini case study. Lastly, this paper provides actionable guidance for future research and development in securing industrial network protocols.
format Article
id doaj-art-ec5b7e7aa2214e859415248af6eaa701
institution OA Journals
issn 2644-125X
language English
publishDate 2025-01-01
publisher IEEE
record_format Article
series IEEE Open Journal of the Communications Society
spelling doaj-art-ec5b7e7aa2214e859415248af6eaa7012025-08-20T02:34:31ZengIEEEIEEE Open Journal of the Communications Society2644-125X2025-01-0164437446110.1109/OJCOMS.2025.356929111002567A Holistic Review of Fuzzing for Vulnerability Assessment in Industrial Network ProtocolsAhmed Reda Aldysty0https://orcid.org/0000-0002-5920-3553Nour Moustafa1https://orcid.org/0000-0001-6127-9349Erandi Lakshika2School of Systems and Computing, University of New South Wales, Canberra, ACT, AustraliaSchool of Systems and Computing, University of New South Wales, Canberra, ACT, AustraliaSchool of Systems and Computing, University of New South Wales, Canberra, ACT, AustraliaIndustrial control systems (ICSs) are considered the backbone of the industry field due to their essential role in supervising and handling crucial manufacturing operations in critical infrastructures such as power grids, water supply systems, and manufacturing processes. ICS systems were not initially designed with robust security measures, making them vulnerable to potential attacks. Accordingly, these attacks can lead to severe consequences, including disrupting services, causing economic damage, and compromising public safety. Notably, the security of Industrial Control Systems depends on the robustness of Industrial Network Protocols (INPs). Therefore, exposing and addressing their vulnerabilities is essential to strengthening these critical infrastructures and proactively mitigating cyber threats. Fuzzing has emerged as a powerful technique for uncovering security flaws in network protocols by systematically generating malformed inputs to trigger unexpected behavior. In this paper, we address a critical area in industrial cybersecurity by examining recent advancements in fuzzing methods for industrial network protocols. Our work provides a comprehensive overview of the fuzzing process, identifies key vulnerabilities in INPs, especially within the widely used Modbus protocol, and highlights the need for more advanced fuzzing strategies. Thus, we present a systematic machine learning-based fuzzing framework tailored to the unique characteristics of industrial protocols, leveraging proven methodologies from existing literature. By evaluating the strengths and limitations of state-of-the-art approaches, we offer valuable insights into the key challenges associated with applying fuzzing to discover vulnerabilities in industrial protocols, such as maintaining message integrity, implementing intelligent log analysis, and addressing the lack of explainability in fuzzing outcomes. Crucially, we also explore how the capabilities of large language models (LLMs), including their comprehensive knowledge bases, contextual understanding, and knowledge consolidation, can be harnessed to overcome these challenges and enhance the effectiveness of fuzzing in industrial environments, which we demonstrate through a mini case study. Lastly, this paper provides actionable guidance for future research and development in securing industrial network protocols.https://ieeexplore.ieee.org/document/11002567/Fuzzingindustrial control systemsindustrial network protocolnetwork protocol fuzzingvulnerabilitymachine learning
spellingShingle Ahmed Reda Aldysty
Nour Moustafa
Erandi Lakshika
A Holistic Review of Fuzzing for Vulnerability Assessment in Industrial Network Protocols
IEEE Open Journal of the Communications Society
Fuzzing
industrial control systems
industrial network protocol
network protocol fuzzing
vulnerability
machine learning
title A Holistic Review of Fuzzing for Vulnerability Assessment in Industrial Network Protocols
title_full A Holistic Review of Fuzzing for Vulnerability Assessment in Industrial Network Protocols
title_fullStr A Holistic Review of Fuzzing for Vulnerability Assessment in Industrial Network Protocols
title_full_unstemmed A Holistic Review of Fuzzing for Vulnerability Assessment in Industrial Network Protocols
title_short A Holistic Review of Fuzzing for Vulnerability Assessment in Industrial Network Protocols
title_sort holistic review of fuzzing for vulnerability assessment in industrial network protocols
topic Fuzzing
industrial control systems
industrial network protocol
network protocol fuzzing
vulnerability
machine learning
url https://ieeexplore.ieee.org/document/11002567/
work_keys_str_mv AT ahmedredaaldysty aholisticreviewoffuzzingforvulnerabilityassessmentinindustrialnetworkprotocols
AT nourmoustafa aholisticreviewoffuzzingforvulnerabilityassessmentinindustrialnetworkprotocols
AT erandilakshika aholisticreviewoffuzzingforvulnerabilityassessmentinindustrialnetworkprotocols
AT ahmedredaaldysty holisticreviewoffuzzingforvulnerabilityassessmentinindustrialnetworkprotocols
AT nourmoustafa holisticreviewoffuzzingforvulnerabilityassessmentinindustrialnetworkprotocols
AT erandilakshika holisticreviewoffuzzingforvulnerabilityassessmentinindustrialnetworkprotocols