An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference Model

被引:0
|
作者
Goo, Young-Hoon [1 ]
Shim, Kyu-Seok [1 ]
Baek, Ui-Jun [2 ]
Park, Jee-Tae [2 ]
Shin, Mu-Gon [2 ]
Kim, Myung-Sup [2 ]
机构
[1] Korea Inst Sci & Technol Informat, Adv KREONET Ctr, Daejeon, South Korea
[2] Korea Univ, Comp Informat & Sci, Sejong, South Korea
关键词
protocol reverse engineering; TCP/IP reference model; genericity;
D O I
10.23919/apnoms50412.2020.9236959
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Protocol reverse engineering represents a very powerful and important tool for network management and security. To cope with the emergence and evolution of rapidly increasing numbers of unknown protocols, automation is of great importance. Many methods for supporting the automation of the various steps for protocol reverse engineering have been investigated; however, there has been no method to automate the analysis of the target network environment. Most methods are designed only for application layer protocols, and all others are designed for specific environments. Given any unknown communication, we must be able to infer the structure of the protocol. However, there has been no research on automatic reverse engineering of protocols when both the protocol and the target network environment are entirely unknown. Here, we propose an automatic protocol reverse engineering approach that is designed to be generally applicable, regardless of the specific network environment. We demonstrate the feasibility of the proposed approach by applying it to several protocols in various layers of the TCP/IP reference model.
引用
收藏
页码:43 / 48
页数:6
相关论文
共 50 条
  • [1] Discoverer: Automatic protocol reverse engineering from network traces
    Cui, Weidong
    Kannan, Jayanthkumar
    Wang, Helen J.
    USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 199 - +
  • [2] A Survey of Automatic Protocol Reverse Engineering Tools
    Narayan, John
    Shukla, Sandeep K.
    Clancy, T. Charles
    ACM COMPUTING SURVEYS, 2015, 48 (03)
  • [3] A viewpoint analysis reference model for Concurrent Engineering
    Hanneghan, M
    Merabti, M
    Colquhoun, G
    COMPUTERS IN INDUSTRY, 2000, 41 (01) : 35 - 49
  • [4] Bit-oriented format extraction approach for automatic binary protocol reverse engineering
    Tao, Siyu
    Yu, Hongyi
    Li, Qing
    IET COMMUNICATIONS, 2016, 10 (06) : 709 - 716
  • [5] Automatic protocol reverse engineering using grammatical inference
    Xiao, Ming-Ming
    Luo, Yu-Ping
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2017, 32 (05) : 3585 - 3594
  • [6] An Automatic Network Protocol State Machine Inference Method in Protocol Reverse Engineering
    Zhao, Lihua
    Liang, Xuejia
    Peng, Xiang
    Kong, HuaFeng
    Wang, Meizhen
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 2496 - 2501
  • [7] A reverse engineering approach for automatic annotation of Web pages
    Roberto De Virgilio
    Flavius Frasincar
    Walter Hop
    Stephan Lachner
    Multimedia Tools and Applications, 2013, 64 : 119 - 140
  • [8] A reverse engineering approach for automatic annotation of Web pages
    De Virgilio, Roberto
    Frasincar, Flavius
    Hop, Walter
    Lachner, Stephan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 64 (01) : 119 - 140
  • [9] Automatic Field Extraction of Extended TLV for Binary Protocol Reverse Engineering
    Huang, Zewen
    Wu, Kui
    Huang, Shengqiang
    Zhou, Yang
    Giagone, Ronnie Salvador
    2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [10] SECURITY ANALYSIS OF TCP/IP NETWORKS An Approach to Automatic Analysis of Network Security Properties
    Sveda, Miroslav
    Rysavy, Ondrej
    Matousek, Petr
    Rab, Jaroslav
    Cejka, Rudolf
    DCNET 2010/OPTICS 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA COMMUNICATION NETWORKING AND INTERNATIONAL CONFERENCE ON OPTICAL COMMUNICATION SYSTEM, 2010, : 5 - 11