2022 IEEE Conference on Communications and Network Security (CNS) 2022
DOI: 10.1109/cns56114.2022.9947242
|View full text |Cite
|
Sign up to set email alerts
|

Refining Network Message Segmentation with Principal Component Analysis

Abstract: Reverse engineering of undocumented protocols is a common task in security analyses of networked services. The communication itself, captured in traffic traces, contains much of the necessary information to perform such a protocol reverse engineering. The comprehension of the format of unknown messages is of particular interest for binary protocols that are not human-readable. One major challenge is to discover probable fields in a message as the basis for further analyses. Given a set of messages, split into … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 21 publications
(43 reference statements)
0
3
0
Order By: Relevance
“…Compared Tools. We select five state-of-the-art protocol reverse engineering tools widely used in academia and industry as baselines, including Netzob [6], Netplier [53], FieldHunter [3], BinaryInferno [9], and Nemesys [22]. Their approaches are diverse.…”
Section: A Experiments Setupmentioning
confidence: 99%
See 2 more Smart Citations
“…Compared Tools. We select five state-of-the-art protocol reverse engineering tools widely used in academia and industry as baselines, including Netzob [6], Netplier [53], FieldHunter [3], BinaryInferno [9], and Nemesys [22]. Their approaches are diverse.…”
Section: A Experiments Setupmentioning
confidence: 99%
“…Network Trace Based Approach. These techniques analyze static network traces to mine features such as message bytes [22], sequences [53], [6], and common field semantics [3], [9]. Some techniques, such as Netzob [6] and Netplier [53], employ an alignment-based approach that classifies messages into distinct clusters and summarizes cluster-specific structures based on alignment [12].…”
Section: A Protocol Reverse Engineeringmentioning
confidence: 99%
See 1 more Smart Citation