A progressive learning method on unknown protocol behaviors

被引:3
作者
Sun, Fanghui [1 ]
Wang, Shen [1 ]
Zhang, Hongli [1 ]
机构
[1] Harbin Inst Technol, Sch Cyberspace Sci, Fac Comp, Harbin 150001, Peoples R China
关键词
Protocol reverse engineering; State machine learning; Finite state transducer; State explosion problem; MESSAGE FORMAT; INFERENCE;
D O I
10.1016/j.jnca.2021.103249
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Reverse analyzing of unknown protocol behaviors keeps being a tough nut in Protocol Reverse Engineering (PRE), which infers specifications of unknown protocols by observable information, especially when only transmitted messages are available. This paper proposes a novel protocol state machine model Stochastic Protocol finite-state Transducer (SPT) to describe the message interaction rules between communicating terminals in a probabilistic way attempting to simulate behavior rules of unknown protocols in certain implementation. Together with a state related field recognition and compensation method, a progressive SPT learning algorithm of unknown protocols named Sptia-PL, is designed and implemented to reconstruct the SPT of target protocol with the ability to predict succeeding behaviors. By updating the SPT progressively, the proposed method is able to learn continuously in linear time and remain the established model in optimal condition during the whole learning process. This strategy thoroughly avoids the state explosion problem existing in most state machine learning methods of PRE. Experiments on two open and three local collected datasets of FTP, SMTP and POP3 prove the rationality of SPT model and effectiveness of Sptia-PL algorithm by an average Accuracy over 0.94 and a Coverage close to 0.99. The small computing cost O(N) of this method and high confidence of results outperforms all the known state-of-the-art methods significantly.
引用
收藏
页数:14
相关论文
共 39 条
  • [21] An Industrial Network Intrusion Detection Algorithm Based on Multifeature Data Clustering Optimization Model
    Liang, Wei
    Li, Kuan-Ching
    Long, Jing
    Kui, Xiaoyan
    Zomaya, Albert Y.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2063 - 2071
  • [22] ReFSM: Reverse engineering from protocol packet traces to test generation by extended finite state machines
    Lin, Ying-Dar
    Lai, Yu-Kuen
    Bui, Quan Tien
    Lai, Yuan-Cheng
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 171
  • [23] Mohri M, 2004, STUD FUZZ SOFT COMP, V148, P551
  • [24] A Survey of Automatic Protocol Reverse Engineering Tools
    Narayan, John
    Shukla, Sandeep K.
    Clancy, T. Charles
    [J]. ACM COMPUTING SURVEYS, 2015, 48 (03)
  • [25] Orebaugh Angela, 2006, Wireshark Ethereal network protocol analyzer toolkit
  • [26] Pang RM, 2003, ACM SIGCOMM COMP COM, V33, P339
  • [27] Postel J., 1981, TRANSMISSION CONTROL
  • [28] A reverse engineering tool for extracting protocols of networked applications
    Shevertalov, Maxim
    Mancoridis, Spiros
    [J]. 14TH WORKING CONFERENCE ON REVERSE ENGINEERING, PROCEEDINGS, 2007, : 229 - 238
  • [29] SU L, 1995, FUZZY SET SYST, V75, P393, DOI 10.1016/0165-0114(94)00388-N
  • [30] Unsupervised field segmentation of unknown protocol messages
    Sun, Fanghui
    Wang, Shen
    Zhang, Chunrui
    Zhang, Hongli
    [J]. COMPUTER COMMUNICATIONS, 2019, 146 : 121 - 130