An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference Model

被引:0
|
作者
Goo, Young-Hoon [1 ]
Shim, Kyu-Seok [1 ]
Baek, Ui-Jun [2 ]
Park, Jee-Tae [2 ]
Shin, Mu-Gon [2 ]
Kim, Myung-Sup [2 ]
机构
[1] Korea Inst Sci & Technol Informat, Adv KREONET Ctr, Daejeon, South Korea
[2] Korea Univ, Comp Informat & Sci, Sejong, South Korea
关键词
protocol reverse engineering; TCP/IP reference model; genericity;
D O I
10.23919/apnoms50412.2020.9236959
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Protocol reverse engineering represents a very powerful and important tool for network management and security. To cope with the emergence and evolution of rapidly increasing numbers of unknown protocols, automation is of great importance. Many methods for supporting the automation of the various steps for protocol reverse engineering have been investigated; however, there has been no method to automate the analysis of the target network environment. Most methods are designed only for application layer protocols, and all others are designed for specific environments. Given any unknown communication, we must be able to infer the structure of the protocol. However, there has been no research on automatic reverse engineering of protocols when both the protocol and the target network environment are entirely unknown. Here, we propose an automatic protocol reverse engineering approach that is designed to be generally applicable, regardless of the specific network environment. We demonstrate the feasibility of the proposed approach by applying it to several protocols in various layers of the TCP/IP reference model.
引用
收藏
页码:43 / 48
页数:6
相关论文
共 50 条
  • [21] Towards a (semi)-automatic reference process to support the reverse engineering and reconstruction of software architectures
    Guaman, Daniel
    Perez, Jennifer
    Diaz, Jessica
    ECSA 2018: PROCEEDINGS OF THE 12TH EUROPEAN CONFERENCE ON SOFTWARE ARCHITECTURE: COMPANION PROCEEDINGS, 2018,
  • [22] Relational reasoning-based approach for network protocol reverse engineering
    Tang, Tong
    Lai, Yingxu
    Wang, Yipeng
    COMPUTER NETWORKS, 2023, 230
  • [23] Protocol State Machine Reverse Engineering with a Teaching-Learning Approach
    Szekely, Gabor
    Ladi, Gergo
    Holczer, Tamas
    Buttyan, Levente
    ACTA CYBERNETICA, 2021, 25 (02): : 517 - 535
  • [24] A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering
    Luo, Xin
    Chen, Dan
    Wang, Yongjun
    Xie, Peidai
    SENSORS, 2019, 19 (03)
  • [25] ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse Engineering
    Jiang, Dongxiao
    Li, Chenggang
    Ma, Lixin
    Ji, Xiaoyu
    Chen, Yanjiao
    Li, Bo
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 19 - 23
  • [26] Automatic protocol reverse-engineering: Message format extraction and field semantics inference
    Caballero, Juan
    Song, Dawn
    COMPUTER NETWORKS, 2013, 57 (02) : 451 - 474
  • [27] Electric power carrier design based on TCP/IP reference model of computer network communication
    Qi, Jun
    Zhang, Wenjie
    Zhou, Xu
    Liu, Yubo
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 203 - 203
  • [28] A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
    Sija, Baraka D.
    Goo, Young-Hoon
    Shim, Kyu-Seok
    Hasanova, Huru
    Kim, Myung-Sup
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [29] Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse-Engineering
    Caballero, Juan
    Poosankam, Pongsin
    Kreibich, Christian
    Song, Dawn
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 621 - 634
  • [30] A rigorous approach to networking: TCP, from implementation to protocol to service
    Ridge, Tom
    Norrish, Michael
    Sewell, Peter
    FM 2008: FORMAL METHODS, PROCEEDINGS, 2008, 5014 : 294 - +