NETPLIER: Probabilistic Network Protocol Reverse Engineering from Message Traces

被引:17
|
作者
Ye, Yapeng [1 ]
Zhang, Zhuo [1 ]
Wang, Fei [1 ]
Zhang, Xiangyu [1 ]
Xu, Dongyan [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
MULTIPLE SEQUENCE ALIGNMENT; INFERENCE;
D O I
10.14722/ndss.2021.24531
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network protocol reverse engineering is an important challenge with many security applications. A popular kind of method leverages network message traces. These methods rely on pair-wise sequence alignment and/or tokenization. They have various limitations such as difficulties of handling a large number of messages and dealing with inherent uncertainty. In this paper, we propose a novel probabilistic method for network trace based protocol reverse engineering. It first makes use of multiple sequence alignment to align all messages and then reduces the problem to identifying the keyword field from the set of aligned fields. The keyword field determines the type of a message. The identification is probabilistic, using random variables to indicate the likelihood of each field (being the true keyword). A joint distribution is constructed among the random variables and the observations of the messages. Probabilistic inference is then performed to determine the most likely keyword field, which allows messages to be properly clustered by their true types and enables the recovery of message format and state machine. Our evaluation on 10 protocols shows that our technique substantially outperforms the state-of-the-art and our case studies show the unique advantages of our technique in IoT protocol reverse engineering and malware analysis.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Reverse Engineering of Authentication Protocol in DesFire
    Labafniya, Mansoureh
    Yusefi, Hamed
    Khalesi, Akram
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (02):
  • [22] Protocol Reverse Engineering Based on DynamoRIO
    He, Yongjun
    Shu, Hui
    Xiong, Xiaobing
    2009 INTERNATIONAL CONFERENCE ON INFORMATION AND MULTIMEDIA TECHNOLOGY, PROCEEDINGS, 2009, : 310 - 314
  • [23] Reverse engineering in communication protocol design
    Otomo, K
    Arakawa, N
    Hirakawa, Y
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1996, E79B (06) : 842 - 848
  • [24] Reverse Engineering of the MMORPG Client Protocol
    Tomicic, Igor
    Grd, Petra
    Schatten, Markus
    2019 42ND INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2019, : 1099 - 1104
  • [25] Reverse engineering models from traces to validate distributed systems - An industrial case study
    Ulrich, Andreas
    Petrenko, Alexandre
    MODEL DRIVEN ARCHITECTURE - FOUNDATIONS AND APPLICATIONS, 2007, 4530 : 184 - +
  • [26] Computer Network Reverse Engineering
    Zhou, Hui
    Du, Wencai
    Xu, Shaochun
    Xin, Qinling
    COMPUTER AND INFORMATION SCIENCE 2011, 2011, 364 : 227 - +
  • [27] Capturing Uncertainty Information and Categorical Characteristics for Network Payload Grouping in Protocol Reverse Engineering
    Luo, Jian-Zhen
    Yu, Shun-Zheng
    Cai, Jun
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2015, 2015
  • [28] A Probabilistic Retransmission Protocol on a Relaying Network
    Maliqi, Faton
    Bassi, Francesca
    Duhamel, Pierre
    Limani, Ilir
    2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2017,
  • [29] Probabilistic Delay Model of Dynamic Message Frame in FlexRay Protocol
    Kim, Bongjun
    Park, Kiejin
    2009 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 2009, : 79 - +
  • [30] Probabilistic Delay Model of Dynamic Message Frame in FlexRay Protocol
    Kim, Bonjun
    Park, Kiejin
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2009, 55 (01) : 77 - 82