Inferring Protocol State Machine from Network Traces: A Probabilistic Approach

被引:0
|
作者
Wang, Yipeng [1 ,3 ]
Zhang, Zhibin [1 ]
Yao, Danfeng Daphne [2 ]
Qu, Buyun [1 ,3 ]
Guo, Li [1 ]
机构
[1] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
[2] Virginia Tech, Dept Comp Sci, Blacksburg, VA USA
[3] Chinese Acad Sci, Grad Univ, Beijing, Peoples R China
关键词
Protocol Model Inference and Analysis; Probabilistic Protocol State Machine; Network Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Application-level protocol specifications (i.e., how a protocol should behave) are helpful for network security management, including intrusion detection and intrusion prevention. The knowledge of protocol specifications is also an effective way of detecting malicious code. However, current methods for obtaining unknown protocol specifications highly rely on manual operations, such as reverse engineering which is a major instrument for extracting application-level specifications but is time-consuming and laborious. Several works have focus their attentions on extracting protocol messages from real-world trace automatically, and leave protocol state machine unsolved. In this paper, we propose Veritas, a system that can automatically infer protocol state machine from real-world network traces. The main feature of Veritas is that it has no prior knowledge of protocol specifications, and our technique is based on the statistical analysis on the protocol formats. We also formally define a new model - probabilistic protocol state machine (P-PSM), which is a probabilistic generalization of protocol state machine. In our experiments, we evaluate a text-based protocol and two binary-based protocols to test the performance of Veritas. Our results show that the protocol state machines that Veritas infers can accurately represent 92% of the protocol flows on average. Our system is general and suitable for both text-based and binary-based protocols. Veritas can also be employed as an auxiliary tool for analyzing unknown behaviors in real-world applications.
引用
收藏
页码:1 / 18
页数:18
相关论文
共 50 条
  • [31] Inferring mobility measures from GPS traces with missing data
    Barnett, Ian
    Onnela, Jukka-Pekka
    BIOSTATISTICS, 2020, 21 (02) : E98 - E112
  • [32] Protocol State Machine Reverse Engineering with a Teaching-Learning Approach
    Szekely, Gabor
    Ladi, Gergo
    Holczer, Tamas
    Buttyan, Levente
    ACTA CYBERNETICA, 2021, 25 (02): : 517 - 535
  • [33] Inferring road maps from sparsely sampled GPS traces
    Qiu, Jia
    Wang, Ruisheng
    JOURNAL OF LOCATION BASED SERVICES, 2016, 10 (02) : 111 - 124
  • [34] Inferring Human Mobility Patterns from Taxicab Location Traces
    Ganti, Raghu K.
    Srivatsa, Mudhakar
    Ranganathan, Anand
    Han, Jiawei
    UBICOMP'13: PROCEEDINGS OF THE 2013 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING, 2013, : 459 - 468
  • [35] Probabilistic Boolean Network for inferring brain connectivity using fMRI data
    Ma, Zheng
    Wang, Z. Jane
    2008 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, VOLS 1-12, 2008, : 457 - +
  • [36] Traces through Time A probabilistic approach to connected archival data
    Ranade, Sonia
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 3260 - 3265
  • [37] A Machine Learning Approach for Idle State Network Anomaly Detection
    Fowdur, T. P.
    Beeharry, Y.
    Aucklah, K.
    SMART AND SUSTAINABLE ENGINEERING FOR NEXT GENERATION APPLICATIONS, 2019, 561 : 205 - 214
  • [38] InspectorGadget: Inferring Network Protocol Configuration for Web Services.
    Naseer, Usama
    Benson, Theophilus
    2018 IEEE 38TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2018, : 1624 - 1629
  • [39] INFERENCE OF A PROBABILISTIC FINITE-STATE MACHINE FROM ITS OUTPUT
    ROUVELLOU, I
    HART, GW
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1995, 25 (03): : 424 - 437
  • [40] The psychology of inferring conditionals from disjunctions: A probabilistic study
    Gilio, Angelo
    Over, David
    JOURNAL OF MATHEMATICAL PSYCHOLOGY, 2012, 56 (02) : 118 - 131