期刊文献+

Protocol Format Extraction Based on an Improved CFSM Algorithm 被引量:2

下载PDF
导出
摘要 As the information technology rapidly develops,many network applications appear and their communication protocols are unknown.Although many protocol keyword recognition based protocol reverse engineering methods have been proposed,most of the keyword recognition algorithms are time consuming.This paper firstly uses the traffic clustering method F-DBSCAN to cluster the unknown protocol traffic.Then an improved CFSM(Closed Frequent Sequence Mining)algorithm is used to mine closed frequent sequences from the messages and identify protocol keywords.Finally,CFGM(Closed Frequent Group Mining)algorithm is proposed to explore the parallel,sequential and hierarchical relations between the protocol keywords and obtain accurate protocol message formats.Experimental results show that the proposed protocol formats extraction method is better than Apriori algorithm and Sequence alignment algorithm in terms of time complexity and it can achieve high keyword recognition accuracy.Additionally,based on the relations between the keywords,the method can obtain accurate protocol formats.Compared with the protocol formats obtained from the existing methods,our protocol format can better grasp the overall structure of target protocols and the results perform better in the application of protocol reverse engineering such as fuzzing test.
出处 《China Communications》 SCIE CSCD 2020年第11期156-180,共25页 中国通信(英文版)
基金 supported by the National Key R&D Subsidized Project with 2017YFB0802900.
  • 相关文献

参考文献3

二级参考文献58

  • 1赵咏,姚秋林,张志斌,郭莉,方滨兴.TPCAD:一种文本类多协议特征自动发现方法[J].通信学报,2009,30(S1):28-35. 被引量:10
  • 2CABALLERO J, POOSANKAM P, KREIBICH C, et al. Dispatcher: enabling active hornet infiltration using automatic protocol reverse-engineering[ C ]//Proc of ACM Conference on Computer and Communications Security. 2009:621-634. 被引量:1
  • 3LEITA C, DACIER M, MASSIC(YITE F. Automatic handling of protocol dependencies and reaction to O-day attacks with ScriptC, en-based honeypots[ C]//Proc of Symposium on Recent Advances in Intrusion Detection. 2006 : 185-205. 被引量:1
  • 4DREGER H, FELDMANN A, MAI M, et al. Dynamic applicationlayer protocol analysis for network intrusion detection [ C ]//Proc of the 15th USENIX Security Symposium. 2006: 257-272. 被引量:1
  • 5COMPARETrI P M, WONDRACEK G, KRUEGEL C, et al. Pwspex: protocol specification extraction [ C]//Proc of the 30th IEEE Symposium on Security and Privacy. 2009:110-125. 被引量:1
  • 6BRUMLEY D, CABALLERO J, LIANG Zhen-kai, et al. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation[ C]//Proc of the 16th USENIX Security Symposium. 2007:213-228. 被引量:1
  • 7GROSSO C D, ANTONtOL G, PENTA M D, et al. Improving network applications security: a new heuristic to generate stress testing [C]//Proc of Data Genetic and Evolutionary Computation Conferenee. 2005 : 1037-1043. 被引量:1
  • 8MCMINN P, HARMAN M, BINKLEY D, et al. The species per path approach to search-based test data generation [ C]//Proc of International Symposium on Software Testing and Analysis. 2006:13-24. 被引量:1
  • 9LEITA C, MERMOUD K, DACIER M. ScriptGen: an automated script generation tool for honeyd[ C]//Proc of the 21st Annual Computer Security Applications Conference. 2005:203- 214. 被引量:1
  • 10CUI Wei-dong, PAXSON V, WEAVER N C, et al. Protoeol-independent adaptive replay of application dialog [ C ]//Proc of the 13th Annual Network and Distributed System Security Symposium. 2006. 被引量:1

共引文献37

同被引文献12

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部