tools. Also more protocols will have to be imple-
mented as instances of the meta model. The pool of
available network protocols could be increased with
import functionality from other tools. Furthermore,
new tools like a visual editor for network protocols
would facilitate working with the meta model.
The most important task is indeed the design of
an abstraction layer for the constraints regarding field
types and dependencies between fields. These con-
straints are defined by multiple assertions, rules, and
optionally by model extensions. This abstraction
layer could be applied as specific comments or anno-
tations within the different XML documents of a meta
model instance. It combines a set of assertions and
rules, and supplies the upper layer with a semantic de-
scription of its functionality. For example, it ensures
that field X is an integer and has to be interpreted as
length of field Y. Meta model tools could implement
this abstraction layer and help to improve the com-
pleteness and correctness of meta model instances.
ACKNOWLEDGEMENTS
This work was supported by the German Federal Min-
istry of Education and Research within the framework
of the project KASTEL SKI in the Competence Center
for Applied Security Technology (KASTEL).
REFERENCES
Bjorklund, M. (2016). The YANG 1.1 Data Modeling Lan-
guage. RFC 7950.
Braden, R. (1989). Requirements for Internet Hosts - Com-
munication Layers. RFC 1122.
Felderer, M., B
¨
uchler, M., Johns, M., Brucker, A. D., Breu,
R., and Pretschner, A. (2016). Security testing: A sur-
vey. In Advances in Computers, volume 101, pages
1–51. Elsevier.
Flanagan, H. and Ginoza, S. (2014). RFC Style Guide. RFC
7322.
Google (2008). Protocol buffers. https://developers.google.
com/protocol-buffers/. Online; accessed 2020-01-06.
Harel, D. (1987). Statecharts: a visual formalism for com-
plex systems. Science of Computer Programming,
8(3):231 – 274.
IEC (2018). Security for industrial automation and con-
trol systems - Part 4-1: Secure product development
lifecycle requirements. International Electrotechnical
Commission (IEC), Geneva, Switzerland.
IEC (2019a). Industrial communication networks - Fieldbus
specifications - Part 5-10: Application layer service
definition - Type 10 elements. IEC 61158-5-10:2019.
IEC (2019b). Industrial communication networks - Field-
bus specifications - Part 6-10: Application layer pro-
tocol specification - Type 10 elements. IEC 61158-6-
10:2019.
ISO (1994). ISO/IEC 7498-1:1994 - Information technol-
ogy – Open Systems Interconnection – Basic Refer-
ence Model: The Basic Model. International Orga-
nization for Standardization (ISO), Geneva, Switzer-
land.
Lakos, C. A. and Keen, C. D. (1991). Modelling layered
protocols in loopn. In Proceedings of the Fourth In-
ternational Workshop on Petri Nets and Performance
Models PNPM91, pages 106–115.
Lakos, C. A. and Keen, C. D. (1994). LOOPN++: A new
language for object-oriented Petri nets. Department
of Computer Science, University of Tasmania.
M. Bjorklund, E. (2010). YANG - A Data Modeling Lan-
guage for the Network Configuration Protocol (NET-
CONF). RFC 6020.
McCann, P. J. and Chandra, S. (2000). Packet types:
abstract specification of network protocol messages.
ACM SIGCOMM Computer Communication Review,
30(4):321–333.
Musuvathi, M., Engler, D. R., et al. (2004). Model check-
ing large network protocol implementations. In NSDI,
volume 4, pages 12–12.
OPC Foundation (2017). OPC Unified Architecture Speci-
fication Part 6: Mappings. OPC Foundation, version
1.04 edition.
Pfrang, S., Giraud, M., Borcherding, A., and Meier, D.
(2019a). Example network protocol. https://github.
com/stepfr/ExampleNetworkProtocol. [Online; ac-
cessed 2019-11-03].
Pfrang, S., Giraud, M., Borcherding, A., Meier, D., and
Beyerer, J. (2019b). Design of an example network
protocol for security tests targeting industrial automa-
tion systems. In Proceedings of the 5th International
Conference on Information Systems Security and Pri-
vacy - Volume 1: ForSE, pages 727–738. INSTICC,
SciTePress.
Pfrang, S., Meier, D., Friedrich, M., and Beyerer, J. (2018).
Advancing protocol fuzzing for industrial automation
and control systems. In Proceedings of the 4th Inter-
national Conference on Information Systems Security
and Privacy - Volume 1: ForSE,, pages 570–580. IN-
STICC, SciTePress.
Pfrang, S., Meier, D., and Kautz, V. (2017). Towards a mod-
ular security testing framework for industrial automa-
tion and control systems: Isutest. In Proceedings of
the 22nd IEEE International Conference on Emerging
Technologies and Factory Automation, ETFA 2017.
R. Enns, E. (2006). NETCONF Configuration Protocol.
RFC 4741.
Turner, K. J. et al. (1993). Using formal description tech-
niques: an introduction to Estelle, LOTOS and SDL,
volume 154. Wiley New York.
W3C (2012). Xml schema definition. [Online; accessed
2019-11-17].
W3C (2015). State chart xml. [Online; accessed 2019-11-
17].
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
682