Vulnerability mining method for industrial control network protocol based on fuzzy test