{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T04:46:00Z","timestamp":1748493960564,"version":"3.37.3"},"reference-count":41,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T00:00:00Z","timestamp":1615507200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFB2004200","2021KF0AB06","61773368"],"award-info":[{"award-number":["2018YFB2004200","2021KF0AB06","61773368"]}]},{"name":"Construction Technology of Local High Security Trusted Execution Environment for Edge Intelligent Controller","award":["2018YFB2004200","2021KF0AB06","61773368"],"award-info":[{"award-number":["2018YFB2004200","2021KF0AB06","61773368"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018YFB2004200","2021KF0AB06","61773368"],"award-info":[{"award-number":["2018YFB2004200","2021KF0AB06","61773368"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Scientific Programming"],"published-print":{"date-parts":[[2021,3,12]]},"abstract":"<jats:p>The coverage of test cases is an important indicator for the security and robustness test of industrial control protocols. It is an important research topic to complete the test with less use cases. Taking Modbus protocol as an example, a calculation method of case similarity and population dispersion based on weight division is proposed in this paper. The method can describe the similarity of use cases and the dispersion degree of individuals in the population more accurately. Genetic algorithm is used to generate and optimize test cases, and individual similarity and population dispersion are used as fitness functions of genetic algorithm. Experimental results show that the proposed method can increase the population dispersion by 3.45% compared with the conventional methods and effectively improve the coverage of test cases.<\/jats:p>","DOI":"10.1155\/2021\/6611732","type":"journal-article","created":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T20:05:10Z","timestamp":1615665910000},"page":"1-9","source":"Crossref","is-referenced-by-count":2,"title":["A Test Cases Generation Method for Industrial Control Protocol Test"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6022-5381","authenticated-orcid":true,"given":"Wenli","family":"Shang","sequence":"first","affiliation":[{"name":"School of Electronic and Communication Engineering, Guangzhou University, Guangzhou 510006, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5040-225X","authenticated-orcid":true,"given":"Guanyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Industrial Control Network and Systems Department, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China"},{"name":"Information and Control Engineering Faculty, Shenyang Jianzhu University, Shenyang 110168, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3331-2081","authenticated-orcid":true,"given":"Tianyu","family":"Wang","sequence":"additional","affiliation":[{"name":"Industrial Control Network and Systems Department, Shenyang Institute of Automation, Chinese Academy of Sciences, Shenyang 110016, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9384-9991","authenticated-orcid":true,"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[{"name":"Information and Control Engineering Faculty, Shenyang Jianzhu University, Shenyang 110168, China"}]}],"member":"311","reference":[{"first-page":"330","article-title":"Cyber security challenges and issues of industrial control systems\u2013some security recommendations","author":"O. E. Idrissi","key":"1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.106946"},{"first-page":"821","article-title":"Current issues and challenges on cyber security for industrial automation and control systems","author":"T. Miyachi","key":"3"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58469-0_5"},{"first-page":"524","article-title":"Cyber attack and defense on industry control systems,","author":"C. Lin","key":"5"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/3092566"},{"issue":"7","key":"7","doi-asserted-by":"crossref","first-page":"2040","DOI":"10.3390\/s20072040","article-title":"Vulnerability mining method for the modbus TCP using an anti-sample fuzzer","volume":"20","author":"Y. X. Lai","year":"2020","journal-title":"Sensors"},{"article-title":"An android application vulnerability mining method based on static and dynamic analysis","volume-title":"\u201c","author":"C. Wang","key":"8"},{"key":"9","first-page":"589","article-title":"A vulnerability mining system based on fuzzing for IEC 61850 protocol","volume-title":"Advances in Engineering Research (AER)","author":"T. Tu"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.7840\/kics.2014.39c.4.362"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-017-1980-3"},{"first-page":"424","article-title":"Design and implementation of fuzzing technology for OPC protocol","author":"T. Wang","key":"12"},{"issue":"5","key":"13","first-page":"1","article-title":"Overview of fuzzy testing technology","volume":"43","author":"X. Zhang","year":"2016","journal-title":"Computer Science"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2763-6"},{"first-page":"202","article-title":"AspFuzz: a state-aware protocol fuzzer based on application-layer protocols","author":"T. Kitagawa","key":"15"},{"issue":"2","key":"16","first-page":"7","article-title":"Survey of automated whitebox fuzz testing","volume":"41","author":"Y. J. Zhang","year":"2014","journal-title":"Computer Science"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1218776.1218785"},{"article-title":"ConData: a tool for automating specification-based test case generation for communication systems","author":"E. Martins","key":"18","doi-asserted-by":"crossref","DOI":"10.1109\/HICSS.2000.926974"},{"author":"G. Banks","key":"19","article-title":"SNOOZE: Toward a stateful network protocol fuzzer,\u201d in information security"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.3724\/sp.j.1016.2011.00242"},{"first-page":"1","article-title":"A Modbus\/TCP Fuzzer for testing internetworked industrial systems,","author":"A. G. Voyiatzis","key":"21"},{"issue":"21","key":"22","first-page":"36","article-title":"Research on network protocol fuzzy test case generation method based on heuristic search and classification tree","volume":"39","author":"J. J. Liu","year":"2016","journal-title":"Modern Electronics Technique"},{"first-page":"5535","article-title":"Policy generator (PG): a heuristic-based fuzzer","author":"A. Felix","key":"23"},{"issue":"4","key":"24","first-page":"5","article-title":"A fuzzy testing method of industrial control protocol based on reverse analysis","volume":"17","author":"H. X. Wang","year":"2019","journal-title":"Electric Power Information and Communication Technology"},{"article-title":"Analysis of mutation and generation-based fuzzing","year":"2007","author":"C. Miller","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101582"},{"first-page":"1115","article-title":"Fuzzing test data generation based on message matrix perturbation with keyword reference","author":"S. J. Gu","key":"27"},{"first-page":"709","article-title":"A fuzzing test for dynamic vulnerability detection on Android Binder mechanism","author":"K. Wang","key":"28"},{"issue":"9","key":"29","first-page":"2265","article-title":"Vulnerability mining method for industry control network protocol based on fuzzing test","volume":"25","author":"Y. X. Lai","year":"2019","journal-title":"Computer Integration Manufacturing System"},{"first-page":"404","article-title":"Troubleshooting test method based on industrial control grammar model","author":"J. Cai","key":"30"},{"issue":"9","key":"31","first-page":"2679","article-title":"Generation of fuzzing test case based on recurrent neural networks","volume":"36","author":"P. Xu","year":"2019","journal-title":"Application Research of Computers"},{"issue":"5","key":"32","first-page":"539","article-title":"Fuzzing test data generation method based on dynamic construction of mutation strategy","volume":"39","author":"L. L. Jiao","year":"2019","journal-title":"Transactions of Beijing Institute of Technology"},{"first-page":"1949","article-title":"MOPT: optimized mutation scheduling for fuzzers,\u201d in SEC\u201919","author":"C. Y. Lyu","key":"33"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2936235"},{"first-page":"45","article-title":"Grammarinator: a grammar-based open source fuzzer","author":"R. Hodov\u00e1n","key":"35"},{"article-title":"Pythia: Grammar-Based Fuzzing of REST APIs with Coverage-Guided Feedback and Learning-Based Mutations","year":"2020","author":"V. Atlidakis","key":"36"},{"first-page":"33","article-title":"Design and implementation of a secure modbus protocol","author":"I. N. Fovino","key":"37"},{"article-title":"Analysis of SCADA security using penetration testing: a case study on Modbus TCP protocol","author":"J. Luswata","key":"38","doi-asserted-by":"crossref","DOI":"10.1109\/BSC.2018.8494686"},{"key":"39","first-page":"153","article-title":"Representation and hidden bias: Gray vs. Binary coding for genetic algorithms","volume-title":"\u201c","author":"R. A. Caruana"},{"first-page":"688","article-title":"Search-based test case generation for Cyber-Physical Systems","author":"A. Arrieta","key":"40"},{"issue":"3","key":"41","article-title":"Fuzzy test method for industrial control protocol combining genetic algorithm","volume":"38","author":"G. Zhang","year":"2021","journal-title":"Computer Application Research"}],"container-title":["Scientific Programming"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/6611732.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/6611732.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/sp\/2021\/6611732.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,13]],"date-time":"2021-03-13T20:05:26Z","timestamp":1615665926000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/sp\/2021\/6611732\/"}},"subtitle":[],"editor":[{"given":"Ting","family":"Yang","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,3,12]]},"references-count":41,"alternative-id":["6611732","6611732"],"URL":"https:\/\/doi.org\/10.1155\/2021\/6611732","relation":{},"ISSN":["1875-919X","1058-9244"],"issn-type":[{"type":"electronic","value":"1875-919X"},{"type":"print","value":"1058-9244"}],"subject":[],"published":{"date-parts":[[2021,3,12]]}}}