Network Communication Protocol Reverse Engineering Based on Auto-Encoder

被引:0
|
作者
Yu, Tianxiang [1 ,2 ]
Xin, Yang [1 ,2 ]
Tao, Yuexin [1 ,2 ]
Hou, Bingqing [1 ,2 ]
Zhu, Hongliang [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Guizhou Univ, Coll Comp Sci & Technol, State Key Lab Publ Big Data, Guiyang 550025, Guizhou, Peoples R China
基金
国家重点研发计划;
关键词
SEARCH;
D O I
10.1155/2022/2924479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network communication protocol reverse engineering is useful for network security, including protocol fuzz testing, botnet command infiltration, and service script generation. Many models have been proposed to generate field boundary, field semantic, state machine, and some other format information from network trace and program execution for text-based protocol and hybrid protocols. However, how to extract format information from network trace data for binary-based protocol still remains a challenging issue. Existing network-trace-based models focus on text-based and hybrid protocols, using tokenization and some other heuristic rules, like field identification, to perform reverse engineering, which makes it hard to apply to binary-based protocol. In this paper, we propose a whole mechanism for binary-based protocol reverse engineering based on auto-encoder models and other clustering algorithms using only network trace data. After evaluation, we set some metrics and compare our model with existing other models, showing its necessity to the field of protocol reverse engineering.
引用
收藏
页数:14
相关论文
共 50 条
  • [21] Auto-encoder based Cognitive Analysis of Questionnary
    Akay, Simge
    Korkmaz, Hande
    Arica, Nafiz
    [J]. 2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,
  • [22] Deep clustering based on embedded auto-encoder
    Huang, Xuan
    Hu, Zhenlong
    Lin, Lin
    [J]. SOFT COMPUTING, 2023, 27 (02) : 1075 - 1090
  • [23] Image Retrieval System based on a Binary Auto-Encoder and a Convolutional Neural Network
    Ferreyra-Ramirez, Andres
    Rodriguez-Martinez, Eduardo
    Aviles-Cruz, Carlos
    Lopez-Saca, Fidel
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2020, 18 (11) : 1925 - 1932
  • [24] Fault Diagnosis Based on A Stacked Sparse Auto-Encoder Network and KNN Classifier
    Yan, Zichen
    Yuan, Xianfeng
    Zhou, Fengyu
    Song, Yong
    Xu, Qingyang
    Shao, Yang
    [J]. 2019 CHINESE AUTOMATION CONGRESS (CAC2019), 2019, : 3129 - 3134
  • [25] Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization
    Yang, Yanqing
    Zheng, Kangfeng
    Wu, Bin
    Yang, Yixian
    Wang, Xiujuan
    [J]. IEEE ACCESS, 2020, 8 : 42169 - 42184
  • [26] Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder
    Osada, Genki
    Omote, Kazumasa
    Nishide, Takashi
    [J]. COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 344 - 361
  • [27] Fault Early Warning Based on Improved Deep Neural Network of Auto-Encoder
    Hao, Huijuan
    Yuan, Huimiao
    Tang, Yongwei
    Zhang, Yu
    Zhao, Yuanyuan
    Wei, Qingxuan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [28] Anomaly detection of mechanical systems based on generative adversarial network and auto-encoder
    Dai, Jun
    Wang, Jun
    Zhu, Zhongkui
    Shen, Changqing
    Huang, Weiguo
    [J]. Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2019, 40 (09): : 16 - 26
  • [29] A Spiking Neural Network Based Auto-encoder for Anomaly Detection in Streaming Data
    Stratton, Peter
    Wabnitz, Andrew
    Hamilton, Tara Julia
    [J]. 2020 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2020, : 1981 - 1988
  • [30] An Auto-Encoder based Membership Inference Attack against Generative Adversarial Network
    Azadmanesh, Maryam
    Ghahfarokhi, Behrouz Shahgholi
    Talouki, Maede Ashouri
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (02): : 240 - 253