NETPLIER: Probabilistic Network Protocol Reverse Engineering from Message Traces

被引:17
|
作者
Ye, Yapeng [1 ]
Zhang, Zhuo [1 ]
Wang, Fei [1 ]
Zhang, Xiangyu [1 ]
Xu, Dongyan [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
MULTIPLE SEQUENCE ALIGNMENT; INFERENCE;
D O I
10.14722/ndss.2021.24531
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network protocol reverse engineering is an important challenge with many security applications. A popular kind of method leverages network message traces. These methods rely on pair-wise sequence alignment and/or tokenization. They have various limitations such as difficulties of handling a large number of messages and dealing with inherent uncertainty. In this paper, we propose a novel probabilistic method for network trace based protocol reverse engineering. It first makes use of multiple sequence alignment to align all messages and then reduces the problem to identifying the keyword field from the set of aligned fields. The keyword field determines the type of a message. The identification is probabilistic, using random variables to indicate the likelihood of each field (being the true keyword). A joint distribution is constructed among the random variables and the observations of the messages. Probabilistic inference is then performed to determine the most likely keyword field, which allows messages to be properly clustered by their true types and enables the recovery of message format and state machine. Our evaluation on 10 protocols shows that our technique substantially outperforms the state-of-the-art and our case studies show the unique advantages of our technique in IoT protocol reverse engineering and malware analysis.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Protocol reverse engineering using grammatical inference
    Xiao, Mingming
    Yu, Shunzheng
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50 (10): : 2044 - 2058
  • [32] A Survey of Automatic Protocol Reverse Engineering Tools
    Narayan, John
    Shukla, Sandeep K.
    Clancy, T. Charles
    ACM COMPUTING SURVEYS, 2015, 48 (03)
  • [33] System Identification and Extraction of Timing Properties from Controller Area Network (CAN) Message Traces
    Di Natale, Marco
    Zeng, Haibo
    2010 IEEE CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2010,
  • [34] SYNTHESIZING A PROTOCOL CONVERTER FROM EXECUTABLE PROTOCOL TRACES
    RAJAGOPAL, M
    MILLER, RE
    IEEE TRANSACTIONS ON COMPUTERS, 1991, 40 (04) : 487 - 499
  • [35] Bbuzz: A Bit-aware Fuzzing Framework for Network Protocol Systematic Reverse Engineering and Analysis
    Blumbergs, Bernhards
    Vaarandi, Risto
    MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 707 - 712
  • [36] Reverse Engineering Variability from Requirement Documents Based on Probabilistic Relevance and Word Embedding
    Li, Yang
    Schulze, Sandro
    Saake, Gunter
    SPLC'18: PROCEEDINGS OF THE 22ND INTERNATIONAL SYSTEMS AND SOFTWARE PRODUCT LINE CONFERENCE, VOL 1, 2018, : 121 - 131
  • [37] Automatic network protocol message format analysis
    Xiao, Ming-Ming
    Zhang, Shi-Long
    Luo, Yu-Ping
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 31 (04) : 2271 - 2279
  • [38] Reverse Engineering of Regulatory Relations in Gene Networks by a Probabilistic Approach
    Ceccarelli, Michele
    Morganella, Sandro
    Zoppoli, Pietro
    FUZZY LOGIC AND APPLICATIONS, 2009, 5571 : 360 - +