2019
DOI: 10.1109/comst.2018.2867544
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis

Abstract: Knowledge about a network protocol to understand the communication between entities is necessary for vulnerability research, penetration testing, malware analysis, network reconnaissance, and network modeling. Traffic analysis is one approach to infer a protocol, and this approach has specific challenges, tasks, methods, and solutions. In this survey, we collect tools presented by prior research in the field of protocol reverse engineering by static traffic trace analysis. We dissect each tool to discern the i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 33 publications
(18 citation statements)
references
References 73 publications
(127 reference statements)
0
15
0
Order By: Relevance
“…For example, when the program does not output data, the writing data function would not be easy to obtain. Kleber et al [7] proposed a scheme to mine the message format based on the data change distribution characteristics of the message. e theoretical basis of the scheme is to statistically analyze the change characteristics of the value range of each field in the message.…”
Section: Introductionmentioning
confidence: 99%
“…For example, when the program does not output data, the writing data function would not be easy to obtain. Kleber et al [7] proposed a scheme to mine the message format based on the data change distribution characteristics of the message. e theoretical basis of the scheme is to statistically analyze the change characteristics of the value range of each field in the message.…”
Section: Introductionmentioning
confidence: 99%
“…The use of sequence alignment to perform such an analysis was first suggested by Beddoe [16]. Since Beddoe's paper, a variety of algorithms from natural language processing and bio-informatics have been applied to network protocols [3]. There are also practical implementations to perform static traffic analysis, the most versatile of which is Netzob [10].…”
Section: Related Workmentioning
confidence: 99%
“…Several recent surveys by Narayan et al [1], Duchêne et al [2], and Kleber et al [3] describe the current state of the art for protocol reverse engineering based on network traffic traces or programs. In this paper, we focus on traffic analysis based on information gained by observing only the communication link.…”
Section: Introductionmentioning
confidence: 99%
“…The PRE process of the protocol includes input preprocessing, protocol format extraction and state machine inference [20][21][22]. First, the input preprocessing captures protocol messages on the network and transforms them into a format suitable for subsequent analysis.…”
Section: Introductionmentioning
confidence: 99%