A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View

被引:20
|
作者
Sija, Baraka D. [1 ]
Goo, Young-Hoon [1 ]
Shim, Kyu-Seok [1 ]
Hasanova, Huru [1 ]
Kim, Myung-Sup [1 ]
机构
[1] Korea Univ, Dept Comp & Informat Sci, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Internet protocols - Open systems - Network security;
D O I
10.1155/2018/8370341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches' outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers' OSI (Open Systems Interconnection) model.
引用
收藏
页数:17
相关论文
共 37 条
  • [1] Survey on Network Protocol Reverse Engineering Approaches, Methods and Tools
    Sija, Baraka D.
    Goo, Young-Hoon
    Kyu-Seok-Shim
    Kim, Sungyun
    Choi, Mi-Jung
    Kim, Myung-Sup
    [J]. 2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGS, 2017, : 271 - 274
  • [2] A Survey of Automatic Protocol Reverse Engineering Tools
    Narayan, John
    Shukla, Sandeep K.
    Clancy, T. Charles
    [J]. ACM COMPUTING SURVEYS, 2015, 48 (03)
  • [3] Protocol Reverse-Engineering Methods and Tools: A Survey
    Huang, Yuyao
    Shu, Hui
    Kang, Fei
    Guang, Yan
    [J]. COMPUTER COMMUNICATIONS, 2022, 182 : 238 - 254
  • [4] METHODS AND APPROACHES FOR REVERSE ENGINEERING
    Chlumecky, Martin
    [J]. SOFTWARE DEVELOPMENT 2012, 2012, : 36 - 42
  • [5] Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis
    Kleber, Stephan
    Maile, Lisa
    Kargl, Frank
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 526 - 561
  • [6] State of the art of network protocol reverse engineering tools
    Duchene, Julien
    Le Guernic, Colas
    Alata, Eric
    Nicomette, Vincent
    Kaaniche, Mohamed
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2018, 14 (01): : 53 - 68
  • [7] Automatic protocol reverse engineering using grammatical inference
    Xiao, Ming-Ming
    Luo, Yu-Ping
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 32 (05) : 3585 - 3594
  • [8] Towards a precise description of reverse engineering methods and tools
    Jarzabek, S
    Woon, I
    [J]. FIRST EUROMICRO CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, PROCEEDINGS, 1997, : 3 - 9
  • [9] A survey of algorithmic methods in IC reverse engineering
    Leonid Azriel
    Julian Speith
    Nils Albartus
    Ran Ginosar
    Avi Mendelson
    Christof Paar
    [J]. Journal of Cryptographic Engineering, 2021, 11 : 299 - 315
  • [10] A survey of algorithmic methods in IC reverse engineering
    Azriel, Leonid
    Speith, Julian
    Albartus, Nils
    Ginosar, Ran
    Mendelson, Avi
    Paar, Christof
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (03) : 299 - 315