Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis

被引:8
|
作者
Hei, Xinhong [1 ]
Bai, Binbin [1 ]
Wang, Yichuan [1 ]
Zhang, Li [1 ]
Zhu, Lei [1 ]
Ji, Wenjiang [1 ]
机构
[1] Xian Univ Technol, Coll Comp Sci & Engn, Xian, Peoples R China
关键词
Apriori; AC; Network Security; Reverse Analysis; Message Format;
D O I
10.1109/TrustCom/BigDataSE.2019.00094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unknown [?] format bitstream network communication protocol not merely brings the challenge to the safe and efficient network management, but also provides the possibility for the security audit and data disclosure of the network communication content. Feature extraction of unknown protocol is an indispensable part of the network protocol reverse. In dealing with this problem, the number of elements in the feature candidate set increases exponentially with the increase of time and the length of frequent items in the existing algorithms such as Apriori and AC(Aho-Corasick). This makes the algorithm have high time and space complexity. In this paper, CFI(Combined Frequent Items) algorithm first employs AC algorithm to generate frequent byte items, then applies Apriori algorithm to perform frequent item matching, and uses location identification to ensure the completeness of feature candidate sets. The experimental results show that compared with the Apriori and AC algorithms, the CFI algorithm can reduce the time complexity by 78% and the space complexity by 60% in time, and can accurately and fleetly analyze the reverse message format from unknown protocols.
引用
收藏
页码:662 / 669
页数:8
相关论文
共 50 条
  • [41] Quadric feature extraction from points cloud in reverse engineering
    Shan, Dongri
    Ke, Yinglin
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2003, 15 (12): : 1497 - 1501
  • [42] Iterative Angular Feature Extraction (IAFE) Method for Reverse Engineering
    Lee, K.H. (lee@kyebek.kjist.ac.kr), 1600, Springer-Verlag London Ltd (21): : 10 - 11
  • [43] Iterative angular feature extraction (IAFE) method for reverse engineering
    Lee, KH
    Ning, W
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2003, 21 (10-11): : 850 - 856
  • [44] Iterative Angular Feature Extraction (IAFE) Method for Reverse Engineering
    K. H. Lee
    W. Ning
    The International Journal of Advanced Manufacturing Technology, 2003, 21 : 850 - 856
  • [45] Multi Look-up Table FPGA Reverse Engineering with Bitstream Extraction and Multiple PIP/PLP Matching
    Yu, Hoyoung
    Cho, Mannhee
    Lee, Sangil
    Lee, Hyung-Min
    Kim, Youngmin
    JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, 2021, 21 (01) : 49 - 61
  • [46] Parallel And SIMD Optimization Of Image Feature Extraction
    Qi, Ming
    Sun, Guangzhong
    Chen, Guoliang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE (ICCS), 2011, 4 : 489 - 498
  • [47] Automatic defects classification and feature extraction optimization
    Kuhlenkoetter, Bernd
    Krewet, Carsten
    Zhang, Xiang
    COMPUTATIONAL INTELLIGENCE, THEORY AND APPLICATION, 2006, : 105 - +
  • [48] Optimization of symbolic feature extraction for pattern classification
    Sarkar, Soumik
    Mukherjee, Kushal
    Jin, Xin
    Singh, Dheeraj S.
    Ray, Asok
    SIGNAL PROCESSING, 2012, 92 (03) : 625 - 635
  • [49] Topology Preserving Feature Extraction with Multiswarm Optimization
    Runkler, Thomas A.
    Bezdek, James C.
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 2997 - 3002
  • [50] The application of optimization in feature extraction of speech recognition
    Gu, L
    Liu, RS
    ICSP '96 - 1996 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, PROCEEDINGS, VOLS I AND II, 1996, : 745 - 748