Survey on Network Protocol Reverse Engineering Approaches, Methods and Tools

被引:0
|
作者
Sija, Baraka D. [1 ]
Goo, Young-Hoon [1 ]
Kyu-Seok-Shim [1 ]
Kim, Sungyun [2 ]
Choi, Mi-Jung [2 ]
Kim, Myung-Sup [1 ]
机构
[1] Korea Univ, Dept Comp & Informat Sci, Sejong, South Korea
[2] Kangwon Natl Univ, Dept Comp Sci, Chunchon, South Korea
关键词
Network Protocols; Unknown Network Protocols; Protocol Reverse Engineering; PRE Outputs; Survey;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A network protocol defines rules that control communications between two or more hosts on the Internet, whereas Protocol Reverse Engineering (PRE) defines the process of extracting the structure, attributes and data from a network protocol. Enough knowledge on protocol specifications is essential for security purposes, network policy implementation and management of network resources. Protocol Reverse Engineering is a complex process intended to uncover specifications of unknown protocols. The complexity of PRE, in terms of time consumption, tediousness and error-prone, has led to short and diverse outcomes of Protocols Reverse Engineering approaches. This paper, surveys outputs of 9 PRE approaches in three divisions with methodology analysis and its possible applications. Moreover, in the introductory part we provide a general PRE literature in great depth.
引用
收藏
页码:271 / 274
页数:4
相关论文
共 50 条
  • [21] Framework for Precise Protocol Reverse Engineering Based on Network Traces
    Goo, Young-Hoon
    Shim, Kyu-Seok
    Chae, Byeong-Min
    Kim, Myung-Sup
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [22] Research Progress of Network Protocol Reverse Engineering Technologies Based on Network Trace
    Wang Z.-F.
    Cheng G.
    Ma W.-J.
    Zhang J.-W.
    Sun Z.-H.
    Hu C.
    Ruan Jian Xue Bao/Journal of Software, 2022, 33 (01): : 254 - 273
  • [23] Characterization of reverse engineering tools
    Caracterización de herramientas de ingeniería inversa
    Monroy, M.E. (mmonroyr@unicartagena.edu.co), 1600, Centro de Informacion Tecnologica (23): : 31 - 42
  • [24] Database Reverse Engineering Tools
    Mlan, Natash Ali
    Hussain, Tauqeer
    SEPADS 08: PROCEEDINGS OF THE 7TH WSEAS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PARALLEL AND DISTRIBUTED SYSTEMS, 2008, : 206 - 211
  • [25] Relational reasoning-based approach for network protocol reverse engineering
    Tang, Tong
    Lai, Yingxu
    Wang, Yipeng
    COMPUTER NETWORKS, 2023, 230
  • [26] Network Communication Protocol Reverse Engineering Based on Auto-Encoder
    Yu, Tianxiang
    Xin, Yang
    Tao, Yuexin
    Hou, Bingqing
    Zhu, Hongliang
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [27] NETPLIER: Probabilistic Network Protocol Reverse Engineering from Message Traces
    Ye, Yapeng
    Zhang, Zhuo
    Wang, Fei
    Zhang, Xiangyu
    Xu, Dongyan
    28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [28] Comparison of reverse-engineering methods using an in Silico network
    Camacho, Diogo
    Licona, Paola Vera
    Mendes, Pedro
    Laubenbacher, Reinhard
    REVERSE ENGINEERING BIOLOGICAL NETWORKS: OPPORTUNITIES AND CHALLENGES IN COMPUTATIONAL METHODS FOR PATHWAY INFERENCE, 2007, 1115 : 73 - 89
  • [29] Quality requirements engineering for systems and software architecting: methods, approaches, and tools
    Capilla, Rafael
    Babar, Muhammad Ali
    Pastor, Oscar
    REQUIREMENTS ENGINEERING, 2012, 17 (04) : 255 - 258
  • [30] Quality requirements engineering for systems and software architecting: methods, approaches, and tools
    Rafael Capilla
    Muhammad Ali Babar
    Oscar Pastor
    Requirements Engineering, 2012, 17 : 255 - 258