An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference Model

被引:0
|
作者
Goo, Young-Hoon [1 ]
Shim, Kyu-Seok [1 ]
Baek, Ui-Jun [2 ]
Park, Jee-Tae [2 ]
Shin, Mu-Gon [2 ]
Kim, Myung-Sup [2 ]
机构
[1] Korea Inst Sci & Technol Informat, Adv KREONET Ctr, Daejeon, South Korea
[2] Korea Univ, Comp Informat & Sci, Sejong, South Korea
关键词
protocol reverse engineering; TCP/IP reference model; genericity;
D O I
10.23919/apnoms50412.2020.9236959
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Protocol reverse engineering represents a very powerful and important tool for network management and security. To cope with the emergence and evolution of rapidly increasing numbers of unknown protocols, automation is of great importance. Many methods for supporting the automation of the various steps for protocol reverse engineering have been investigated; however, there has been no method to automate the analysis of the target network environment. Most methods are designed only for application layer protocols, and all others are designed for specific environments. Given any unknown communication, we must be able to infer the structure of the protocol. However, there has been no research on automatic reverse engineering of protocols when both the protocol and the target network environment are entirely unknown. Here, we propose an automatic protocol reverse engineering approach that is designed to be generally applicable, regardless of the specific network environment. We demonstrate the feasibility of the proposed approach by applying it to several protocols in various layers of the TCP/IP reference model.
引用
收藏
页码:43 / 48
页数:6
相关论文
共 50 条
  • [31] From Code to Design: A Reverse Engineering Approach
    Varoy, Elliot
    Burrows, John
    Sun, Jing
    Manoharan, Sathiamoorthy
    2016 21ST INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2016), 2016, : 181 - 186
  • [32] Automatic Reverse Engineering of Interaction Models from System Logs
    Wolny, Sabine
    Mazak, Alexandra
    Wimmer, Manuel
    2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 57 - 64
  • [33] IPART: an automatic protocol reverse engineering tool based on global voting expert for industrial protocols
    Wang, Xiaowei
    Lv, Kezhi
    Li, Bo
    INTERNATIONAL JOURNAL OF PARALLEL EMERGENT AND DISTRIBUTED SYSTEMS, 2020, 35 (03) : 376 - 395
  • [34] From Spectra to Localized Networks: A Reverse Engineering Approach
    Pradhan, Priodyuti
    Jalan, Sarika
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2020, 7 (04): : 3008 - 3017
  • [35] Low-latency and high bandwidth TCP/IP protocol processing through an integrated HW/SW approach
    Inoue, Ken
    Pasetto, Davide
    Lynch, Karol
    Meneghin, Massimiliano
    Muller, Kay
    Sheehan, John
    2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2967 - 2975
  • [36] NETPLIER: Probabilistic Network Protocol Reverse Engineering from Message Traces
    Ye, Yapeng
    Zhang, Zhuo
    Wang, Fei
    Zhang, Xiangyu
    Xu, Dongyan
    28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021), 2021,
  • [37] Reverse extraction of protocol model from network applications
    Li, Meijian
    Wang, Yongjun
    Jin, Shangjie
    Xie, Peidai
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2013, 7 (04) : 228 - 245
  • [38] A taint based approach for automatic reverse engineering of gray-box file formats
    Cui, Baojiang
    Wang, Fuwei
    Hao, Yongle
    Wang, Lingyu
    SOFT COMPUTING, 2016, 20 (09) : 3563 - 3578
  • [39] A taint based approach for automatic reverse engineering of gray-box file formats
    Baojiang Cui
    Fuwei Wang
    Yongle Hao
    Lingyu Wang
    Soft Computing, 2016, 20 : 3563 - 3578
  • [40] Reverse engineering approach: a step towards a new era of vaccinology with special reference to Salmonella
    Vij, Shania
    Thakur, Reena
    Rishi, Praveen
    EXPERT REVIEW OF VACCINES, 2022, 21 (12) : 1763 - 1785