2016
DOI: 10.1155/2016/9161723
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Network Protocols of Application Layer Using Hidden Semi-Markov Model

Abstract: With the rapid development of Internet, especially the mobile Internet, the new applications or network attacks emerge in a high rate in recent years. More and more traffic becomes unknown due to the lack of protocol specifications about the newly emerging applications. Automatic protocol reverse engineering is a promising solution for understanding this unknown traffic and recovering its protocol specification. One challenge of protocol reverse engineering is to determine the length of protocol keywords and m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…They deduced design decisions for fields in these protocols to obtain hypotheses on field sizes and behavior. 9) Cai et al (2016): An idea similar to Whalen et al [19] for extracting message formats was proposed by Cai et al [25], relying completely on Markov Models. In contrast to Whalen et al, the new approach requires no previous knowledge of field boundary candidates.…”
Section: ) Protocol Informatics (2004)mentioning
confidence: 99%
See 1 more Smart Citation
“…They deduced design decisions for fields in these protocols to obtain hypotheses on field sizes and behavior. 9) Cai et al (2016): An idea similar to Whalen et al [19] for extracting message formats was proposed by Cai et al [25], relying completely on Markov Models. In contrast to Whalen et al, the new approach requires no previous knowledge of field boundary candidates.…”
Section: ) Protocol Informatics (2004)mentioning
confidence: 99%
“…At the end of each section, we conclude the application of the presented methods and algorithms for the respective [11] RolePlayer [18] Discoverer [13] Whalen et al [19] Biprominer [20] ProDecoder [21] Li et al [22] FieldHunter [23,24] Cai et al [25] PRE-Bin [26] Xiao et al [27] NEMESYS [28] ScriptGen [29] PEXT [30] Trifilo et al [31] Veritas [32] PREUGI [33] AutoFuzz [34] ReverX [14] ASAP [35] PRISMA [15] AutoReEngine [17] Netzob [16] process step. This discussion is intended to provide lessons learned from the application of the methods.…”
Section: Solutions and Algorithmsmentioning
confidence: 99%
“…This section analyzes 39 different approaches, methods, and tools outputs' focus in relation to the algorithms and/or technique along with architectures applied. [4] 2007 I PFSM for future work Polyglot [5] 2007 I Dispatcher [6] 1st work AutoFormat [7] 2008 I ∼ Tupni [8] 2008 I PFSM for future work ReFormat [9] 2009 I Decryption before PRE Prospex [10] 2009 I Reverse engineers PFSM as well ProDecoder [11] 2012 I ∼ Wang et al [12] 2013 I PRE in wireless environment ProGraph [13] 2015 I Traffic classification Cai et al [14] 2016 In the Tokenization and Initial Clustering module, Discoverer clusters messages based on their token patterns assigned in 4-tuple information (dir, class of token 1, class of token 2,. . ., class of token n) where dir is the direction of the message C2S or S2C followed by the classes of all tokens in a given message.…”
Section: Distribution Of Automatic Protocol Reverse Engineeringmentioning
confidence: 99%
“…Cai et al [14] aim at selecting fields keywords with their optimal lengths and finding about how protocol messages are segmented. Through a hidden semi-Markov model Cai et al try to model an entire protocol message format.…”
Section: Distribution Of Automatic Protocol Reverse Engineeringmentioning
confidence: 99%
See 1 more Smart Citation