NETPLIER: Probabilistic Network Protocol Reverse Engineering from Message Traces

被引:17
|
作者
Ye, Yapeng [1 ]
Zhang, Zhuo [1 ]
Wang, Fei [1 ]
Zhang, Xiangyu [1 ]
Xu, Dongyan [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
MULTIPLE SEQUENCE ALIGNMENT; INFERENCE;
D O I
10.14722/ndss.2021.24531
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network protocol reverse engineering is an important challenge with many security applications. A popular kind of method leverages network message traces. These methods rely on pair-wise sequence alignment and/or tokenization. They have various limitations such as difficulties of handling a large number of messages and dealing with inherent uncertainty. In this paper, we propose a novel probabilistic method for network trace based protocol reverse engineering. It first makes use of multiple sequence alignment to align all messages and then reduces the problem to identifying the keyword field from the set of aligned fields. The keyword field determines the type of a message. The identification is probabilistic, using random variables to indicate the likelihood of each field (being the true keyword). A joint distribution is constructed among the random variables and the observations of the messages. Probabilistic inference is then performed to determine the most likely keyword field, which allows messages to be properly clustered by their true types and enables the recovery of message format and state machine. Our evaluation on 10 protocols shows that our technique substantially outperforms the state-of-the-art and our case studies show the unique advantages of our technique in IoT protocol reverse engineering and malware analysis.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Clustering method in protocol reverse engineering for industrial protocols
    Shim, Kyu-Seok
    Goo, Young-Hoon
    Lee, Min-Seob
    Kim, Myung-Sup
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2020, 30 (06)
  • [42] Protocol Reverse Engineering Using LDA and Association Analysis
    Li, Haifeng
    Shuai, Bo
    Wang, Jian
    Tang, Chaojing
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 312 - 316
  • [43] Protocol Reverse-Engineering Methods and Tools: A Survey
    Huang, Yuyao
    Shu, Hui
    Kang, Fei
    Guang, Yan
    COMPUTER COMMUNICATIONS, 2022, 182 : 238 - 254
  • [44] Recovery of communications protocol design from protocol execution traces
    Saleh, K
    Probert, R
    Manonmani, I
    SECOND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS: HELD JOINTLY WITH 6TH CSESAW, 4TH IEEE RTAW, AND SES'96, 1996, : 265 - 272
  • [45] Automatic protocol reverse engineering using grammatical inference
    Xiao, Ming-Ming
    Luo, Yu-Ping
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 32 (05) : 3585 - 3594
  • [46] Toward Fuzz Test Based on Protocol Reverse Engineering
    Cai, Jun
    Luo, Jian-Zhen
    Ruan, Jianliang
    Liu, Yan
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 892 - 897
  • [47] PREUNN: Protocol Reverse Engineering using Neural Networks
    Kiechle, Valentin
    Boersig, Matthias
    Nitzsche, Sven
    Baumgart, Ingmar
    Becker, Juergen
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 345 - 356
  • [48] An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference Model
    Goo, Young-Hoon
    Shim, Kyu-Seok
    Baek, Ui-Jun
    Park, Jee-Tae
    Shin, Mu-Gon
    Kim, Myung-Sup
    APNOMS 2020: 2020 21ST ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2020, : 43 - 48
  • [49] An Improved Short Message Security Protocol For Home Network
    Pu, Liu
    2009 ETP INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION (FCC 2009), 2009, : 62 - 65
  • [50] MinVisited: A Message Routing Protocol for Delay Tolerant Network
    Veas-Castillo, Luis
    Ovando-Leon, Gabriel
    Gil-Costa, Veronica
    Marin, Mauricio
    2018 26TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, AND NETWORK-BASED PROCESSING (PDP 2018), 2018, : 325 - 328