Feature Extraction Optimization for Bitstream Communication Protocol Format Reverse Analysis

被引:10
作者
Hei, Xinhong [1 ]
Bai, Binbin [1 ]
Wang, Yichuan [1 ]
Zhang, Li [1 ]
Zhu, Lei [1 ]
Ji, Wenjiang [1 ]
机构
[1] Xian Univ Technol, Coll Comp Sci & Engn, Xian, Peoples R China
来源
2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019) | 2019年
关键词
Apriori; AC; Network Security; Reverse Analysis; Message Format;
D O I
10.1109/TrustCom/BigDataSE.2019.00094
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The unknown [?] format bitstream network communication protocol not merely brings the challenge to the safe and efficient network management, but also provides the possibility for the security audit and data disclosure of the network communication content. Feature extraction of unknown protocol is an indispensable part of the network protocol reverse. In dealing with this problem, the number of elements in the feature candidate set increases exponentially with the increase of time and the length of frequent items in the existing algorithms such as Apriori and AC(Aho-Corasick). This makes the algorithm have high time and space complexity. In this paper, CFI(Combined Frequent Items) algorithm first employs AC algorithm to generate frequent byte items, then applies Apriori algorithm to perform frequent item matching, and uses location identification to ensure the completeness of feature candidate sets. The experimental results show that compared with the Apriori and AC algorithms, the CFI algorithm can reduce the time complexity by 78% and the space complexity by 60% in time, and can accurately and fleetly analyze the reverse message format from unknown protocols.
引用
收藏
页码:662 / 669
页数:8
相关论文
共 22 条
[1]  
Abdulazeez SA, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), P1106, DOI 10.1109/ICCNC.2015.7069504
[2]  
[Anonymous], 2006, P 13 ANN NETW DISTR
[3]  
Beddoe M., 2004, The protocol informatics project
[4]   EXPOSURE: A Passive DNS Analysis Service to Detect and Report Malicious Domains [J].
Bilge, Leyla ;
Sen, Sevil ;
Balzarotti, Davide ;
Kirda, Engin ;
Kruegel, Christopher .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 16 (04)
[5]  
Bruesch Arne, 2019, IEEE T MOBILE COMPUT, V2019
[6]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[7]  
Caballero J, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P317
[8]  
Chan F Y D, 2019, U.S. Patent Application, Patent No. [10/212,486, 10212486]
[9]   On sequential frame synchronization in AWGN channels [J].
Chiani, M ;
Martini, MG .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2006, 54 (02) :339-348
[10]   Prospex: Protocol Specification Extraction [J].
Comparetti, Paolo Milani ;
Wondracek, Gilbert ;
Kruegel, Christopher ;
Kirda, Engin .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :110-+