NETPLIER: Probabilistic Network Protocol Reverse Engineering from Message Traces

被引:17
|
作者
Ye, Yapeng [1 ]
Zhang, Zhuo [1 ]
Wang, Fei [1 ]
Zhang, Xiangyu [1 ]
Xu, Dongyan [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
MULTIPLE SEQUENCE ALIGNMENT; INFERENCE;
D O I
10.14722/ndss.2021.24531
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network protocol reverse engineering is an important challenge with many security applications. A popular kind of method leverages network message traces. These methods rely on pair-wise sequence alignment and/or tokenization. They have various limitations such as difficulties of handling a large number of messages and dealing with inherent uncertainty. In this paper, we propose a novel probabilistic method for network trace based protocol reverse engineering. It first makes use of multiple sequence alignment to align all messages and then reduces the problem to identifying the keyword field from the set of aligned fields. The keyword field determines the type of a message. The identification is probabilistic, using random variables to indicate the likelihood of each field (being the true keyword). A joint distribution is constructed among the random variables and the observations of the messages. Probabilistic inference is then performed to determine the most likely keyword field, which allows messages to be properly clustered by their true types and enables the recovery of message format and state machine. Our evaluation on 10 protocols shows that our technique substantially outperforms the state-of-the-art and our case studies show the unique advantages of our technique in IoT protocol reverse engineering and malware analysis.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Discoverer: Automatic protocol reverse engineering from network traces
    Cui, Weidong
    Kannan, Jayanthkumar
    Wang, Helen J.
    USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 199 - +
  • [2] Framework for Precise Protocol Reverse Engineering Based on Network Traces
    Goo, Young-Hoon
    Shim, Kyu-Seok
    Chae, Byeong-Min
    Kim, Myung-Sup
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [3] Inferring Protocol State Machine from Network Traces: A Probabilistic Approach
    Wang, Yipeng
    Zhang, Zhibin
    Yao, Danfeng Daphne
    Qu, Buyun
    Guo, Li
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 1 - 18
  • [4] A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering
    Luo, Xin
    Chen, Dan
    Wang, Yongjun
    Xie, Peidai
    SENSORS, 2019, 19 (03)
  • [5] ReFSM: Reverse engineering from protocol packet traces to test generation by extended finite state machines
    Lin, Ying-Dar
    Lai, Yu-Kuen
    Bui, Quan Tien
    Lai, Yuan-Cheng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 171
  • [6] State of the art of network protocol reverse engineering tools
    Duchene, Julien
    Le Guernic, Colas
    Alata, Eric
    Nicomette, Vincent
    Kaaniche, Mohamed
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2018, 14 (01): : 53 - 68
  • [7] De-encapsulation of Network Packets for Network Protocol Reverse Engineering
    Watrobski, Paul T.
    Summerville, Douglas H.
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 557 - 562
  • [8] An Automatic Network Protocol State Machine Inference Method in Protocol Reverse Engineering
    Zhao, Lihua
    Liang, Xuejia
    Peng, Xiang
    Kong, HuaFeng
    Wang, Meizhen
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 2496 - 2501
  • [9] Survey on Network Protocol Reverse Engineering Approaches, Methods and Tools
    Sija, Baraka D.
    Goo, Young-Hoon
    Kyu-Seok-Shim
    Kim, Sungyun
    Choi, Mi-Jung
    Kim, Myung-Sup
    2017 19TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS 2017): MANAGING A WORLD OF THINGS, 2017, : 271 - 274
  • [10] Private Protocol Reverse Engineering Based on Network Traffic: A Survey
    Li J.
    Cheng G.
    Yang G.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2023, 60 (01): : 167 - 190