2019
DOI: 10.3390/s19030716
|View full text |Cite
|
Sign up to set email alerts
|

A Type-Aware Approach to Message Clustering for Protocol Reverse Engineering

Abstract: Protocol Reverse Engineering (PRE) is crucial for information security of Internet-of-Things (IoT), and message clustering determines the effectiveness of PRE. However, the quality of services still lags behind the strict requirement of IoT applications as the results of message clustering are often coarse-grained with the intrinsic type information hidden in messages largely ignored. Aiming at this problem, this study proposes a type-aware approach to message clustering guided by type information. The approac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 19 publications
(21 reference statements)
0
5
0
Order By: Relevance
“…Related works have typically focused on inferring message format types from packets of a single unknown protocol [5] - [7], using feature extraction and clustering techniques such as sequence alignment [5] and information bottleneck [8]. Today, there are hundreds of different protocols and it is naive and limiting to assume that a stream of unknown packets belong to a single protocol.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Related works have typically focused on inferring message format types from packets of a single unknown protocol [5] - [7], using feature extraction and clustering techniques such as sequence alignment [5] and information bottleneck [8]. Today, there are hundreds of different protocols and it is naive and limiting to assume that a stream of unknown packets belong to a single protocol.…”
Section: Related Workmentioning
confidence: 99%
“…Previous works have also typically used information from the entire packet for feature extraction [5] - [7]. However, only the header of protocol packets usually contain information with relevance to the protocol's operation.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…READ improves Signal extraction and classification efficiency. Luo et al [26] employed the Latent Dirichlet Allocation model to characterize messages with types, and then type distribution is used to measure the similarity of messages and promote the correctness of the message cluster. Goo et al [27] proposed a method that can infer the protocol format, semantic and finite state machine.…”
Section: Related Workmentioning
confidence: 99%
“…The information contains data relating to finding the object/thing, which is stored in the flip-chip package [ 13 ]. For tag activation, the harvested RF power originating from RFID reader ought to be sufficient, as opposed to the threshold power of the IC after crossing over the barrier losses [ 13 , 14 , 15 ].…”
Section: Introductionmentioning
confidence: 99%