Survey on Network Protocol Reverse Engineering Approaches, Methods and Tools

被引:0
|
作者
Sija, Baraka D. [1 ]
Goo, Young-Hoon [1 ]
Kyu-Seok-Shim [1 ]
Kim, Sungyun [2 ]
Choi, Mi-Jung [2 ]
Kim, Myung-Sup [1 ]
机构
[1] Korea Univ, Dept Comp & Informat Sci, Sejong, South Korea
[2] Kangwon Natl Univ, Dept Comp Sci, Chunchon, South Korea
关键词
Network Protocols; Unknown Network Protocols; Protocol Reverse Engineering; PRE Outputs; Survey;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A network protocol defines rules that control communications between two or more hosts on the Internet, whereas Protocol Reverse Engineering (PRE) defines the process of extracting the structure, attributes and data from a network protocol. Enough knowledge on protocol specifications is essential for security purposes, network policy implementation and management of network resources. Protocol Reverse Engineering is a complex process intended to uncover specifications of unknown protocols. The complexity of PRE, in terms of time consumption, tediousness and error-prone, has led to short and diverse outcomes of Protocols Reverse Engineering approaches. This paper, surveys outputs of 9 PRE approaches in three divisions with methodology analysis and its possible applications. Moreover, in the introductory part we provide a general PRE literature in great depth.
引用
收藏
页码:271 / 274
页数:4
相关论文
共 50 条
  • [1] Protocol Reverse-Engineering Methods and Tools: A Survey
    Huang, Yuyao
    Shu, Hui
    Kang, Fei
    Guang, Yan
    [J]. COMPUTER COMMUNICATIONS, 2022, 182 : 238 - 254
  • [2] A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
    Sija, Baraka D.
    Goo, Young-Hoon
    Shim, Kyu-Seok
    Hasanova, Huru
    Kim, Myung-Sup
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [3] A Survey of Automatic Protocol Reverse Engineering Tools
    Narayan, John
    Shukla, Sandeep K.
    Clancy, T. Charles
    [J]. ACM COMPUTING SURVEYS, 2015, 48 (03)
  • [4] State of the art of network protocol reverse engineering tools
    Duchene, Julien
    Le Guernic, Colas
    Alata, Eric
    Nicomette, Vincent
    Kaaniche, Mohamed
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2018, 14 (01): : 53 - 68
  • [5] Private Protocol Reverse Engineering Based on Network Traffic: A Survey
    Li, Junchen
    Cheng, Guang
    Yang, Gangqin
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 167 - 190
  • [6] METHODS AND APPROACHES FOR REVERSE ENGINEERING
    Chlumecky, Martin
    [J]. SOFTWARE DEVELOPMENT 2012, 2012, : 36 - 42
  • [7] Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis
    Kleber, Stephan
    Maile, Lisa
    Kargl, Frank
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 526 - 561
  • [8] Towards a precise description of reverse engineering methods and tools
    Jarzabek, S
    Woon, I
    [J]. FIRST EUROMICRO CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING, PROCEEDINGS, 1997, : 3 - 9
  • [9] A survey of algorithmic methods in IC reverse engineering
    Leonid Azriel
    Julian Speith
    Nils Albartus
    Ran Ginosar
    Avi Mendelson
    Christof Paar
    [J]. Journal of Cryptographic Engineering, 2021, 11 : 299 - 315
  • [10] A survey of algorithmic methods in IC reverse engineering
    Azriel, Leonid
    Speith, Julian
    Albartus, Nils
    Ginosar, Ran
    Mendelson, Avi
    Paar, Christof
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2021, 11 (03) : 299 - 315