Deep neural network-based automatic unknown protocol classification system using histogram feature

被引:6
作者
Jung, YoungGiu [1 ]
Jeong, Chang-Min [2 ]
机构
[1] YM Naeultech, Incheon, South Korea
[2] Agcy Def Dev, Yuseong, Daejeon, South Korea
关键词
Automatic protocol reverse engineering; Transformed protocol; Deep belief networks; Average histogram feature;
D O I
10.1007/s11227-019-03108-w
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The protocol reverse engineering technique can be used to extract the specification of an unknown protocol. However, there is no standardized method, and in most cases, the extracting process is executed manually or semiautomatically. Since only frequently seen values are extracted as fields from the messages of a protocol, it is difficult to understand the complete specification of the protocol. Therefore, if the information about the structure of an unknown protocol could be acquired in advance, it would be easy to conduct reverse engineering. As such, one of the most important techniques for classifying unknown protocols is a feature extraction algorithm. In this paper, we propose a new feature extraction algorithm based on average histogram for classification of an unknown protocol and design unknown protocol classifier using deep belief networks, one of deep learning algorithms. In order to verify the performance of the proposed system, we performed the training using eight open protocols to evaluate the performance using unknown data. Experimental results show that the proposed technique gives significantly more reliable results of about 99% classification performance, regardless of the strength of the modification of the protocol.
引用
收藏
页码:5425 / 5441
页数:17
相关论文
共 10 条
[1]  
[Anonymous], P PASS ACT MEAS WORK
[2]  
Cao K, 2018, J INF PROCESS SYST, V14, P1508
[3]  
Cui WD, 2007, USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, P199
[4]  
Cui WD, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P391
[5]  
He K, 2015, INT CONF WIRE COMMUN
[6]  
Lee G. I., 2019, THESIS
[7]  
Lin RQ, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), P300, DOI 10.1109/CompComm.2015.7387586
[8]  
Wondracek G., 2008, P NETWORK DISTRIBUTE, P1
[9]   POSTER: Mining Elephant Applications in Unknown Traffic by Service Clustering [J].
Yu, Hongliang ;
Zhao, Yong ;
Xiong, Gang ;
Guo, Li ;
Li, Zhen ;
Wang, Yong .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :1532-1534
[10]   Robust Network Traffic Classification [J].
Zhang, Jun ;
Chen, Xiao ;
Xiang, Yang ;
Zhou, Wanlei ;
Wu, Jie .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2015, 23 (04) :1257-1270