Inferring Protocol State Machine from Network Traces: A Probabilistic Approach

被引:0
|
作者
Wang, Yipeng [1 ,3 ]
Zhang, Zhibin [1 ]
Yao, Danfeng Daphne [2 ]
Qu, Buyun [1 ,3 ]
Guo, Li [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
[2] Virginia Tech, Dept Comp Sci, Blacksburg, VA USA
[3] Chinese Acad Sci, Grad Univ, Beijing, Peoples R China
关键词
Protocol Model Inference and Analysis; Probabilistic Protocol State Machine; Network Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Application-level protocol specifications (i.e., how a protocol should behave) are helpful for network security management, including intrusion detection and intrusion prevention. The knowledge of protocol specifications is also an effective way of detecting malicious code. However, current methods for obtaining unknown protocol specifications highly rely on manual operations, such as reverse engineering which is a major instrument for extracting application-level specifications but is time-consuming and laborious. Several works have focus their attentions on extracting protocol messages from real-world trace automatically, and leave protocol state machine unsolved. In this paper, we propose Veritas, a system that can automatically infer protocol state machine from real-world network traces. The main feature of Veritas is that it has no prior knowledge of protocol specifications, and our technique is based on the statistical analysis on the protocol formats. We also formally define a new model - probabilistic protocol state machine (P-PSM), which is a probabilistic generalization of protocol state machine. In our experiments, we evaluate a text-based protocol and two binary-based protocols to test the performance of Veritas. Our results show that the protocol state machines that Veritas infers can accurately represent 92% of the protocol flows on average. Our system is general and suitable for both text-based and binary-based protocols. Veritas can also be employed as an auxiliary tool for analyzing unknown behaviors in real-world applications.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [1] Inferring Protocol State Machine for Binary Communication Protocol
    Meng, Fanzhi
    Liu, Yuan
    Zhang, Chunrui
    Li, Tong
    Yue, Yang
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 870 - 874
  • [2] NETPLIER: Probabilistic Network Protocol Reverse Engineering from Message Traces
    Ye, Yapeng
    Zhang, Zhuo
    Wang, Fei
    Zhang, Xiangyu
    Xu, Dongyan
    28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [3] Inferring Protocol State Machine from Real-World Trace
    Wang, Yipeng
    Zhang, Zhibin
    Guo, Li
    RECENT ADVANCES IN INTRUSION DETECTION, 2010, 6307 : 498 - 499
  • [4] MACHINE TRACES AND PROTOCOL STATEMENTS
    DENNETT, DC
    BEHAVIORAL SCIENCE, 1968, 13 (02): : 155 - &
  • [5] Discoverer: Automatic protocol reverse engineering from network traces
    Cui, Weidong
    Kannan, Jayanthkumar
    Wang, Helen J.
    USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 199 - +
  • [6] Inferring Computational State Machine Models from Program Executions
    Walkinshaw, Neil
    Hall, Mathew
    32ND IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2016), 2016, : 123 - 133
  • [7] From Phenomenology to Traces: Inferring Memory Mechanisms
    Carava, Marta
    Robins, Sarah K.
    CONSTRUCTIVIST FOUNDATIONS, 2023, 19 (01): : 70 - 72
  • [8] Inferring Hierarchical Motifs from Execution Traces
    Alimadadi, Saba
    Mesbah, Ali
    Pattabiraman, Karthik
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 776 - 787
  • [9] A Probabilistic and Timed Verification Approach of SysML State Machine Diagram
    Baouya, Abdelhakim
    Bennouar, Djamal
    Mohamed, Otmane Ait
    Ouchani, Samir
    2015 12TH IEEE INTERNATIONAL CONFERENCE ON PROGRAMMING AND SYSTEMS (ISPS), 2015, : 304 - 312
  • [10] An Automatic Network Protocol State Machine Inference Method in Protocol Reverse Engineering
    Zhao, Lihua
    Liang, Xuejia
    Peng, Xiang
    Kong, HuaFeng
    Wang, Meizhen
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 2496 - 2501