2017 IEEE International Conference on Software Quality, Reliability and Security (QRS) 2017
DOI: 10.1109/qrs.2017.49
|View full text |Cite
|
Sign up to set email alerts
|

Using Segment-Based Alignment to Extract Packet Structures from Network Traces

Abstract: Abstract-Many applications in security, from understanding unfamiliar protocols to fuzz-testing and guarding against potential attacks, rely on analysing network protocols. In many situations we cannot rely on access to a specification or even an implementation of the protocol, and must instead rely on raw network data "sniffed" from the network. When this is the case, one of the key challenges is to discern from the raw data the underlying packet structures -a task that is commonly carried out by using alignm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 32 publications
0
4
0
Order By: Relevance
“…Protocol reverse engineering targets at inferring the specification of unknown network protocols for further security evaluation [56], [63], [37], [73]. There are two main categories, either by program analysis [28], [57], [82], [33], [59], [32] or by network traces [22], [55], [35], [52], [81], [51], [80], [26], [38], [47]. Network trace methods are usually based on sequence alignment algorithms [64] or token patterns, and are limited for their low accuracy or conciseness.…”
Section: Related Workmentioning
confidence: 99%
“…Protocol reverse engineering targets at inferring the specification of unknown network protocols for further security evaluation [56], [63], [37], [73]. There are two main categories, either by program analysis [28], [57], [82], [33], [59], [32] or by network traces [22], [55], [35], [52], [81], [51], [80], [26], [38], [47]. Network trace methods are usually based on sequence alignment algorithms [64] or token patterns, and are limited for their low accuracy or conciseness.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, the fields are merged according to the change rate, mean value, and variance of adjacent fields in the segmented group. Esoul and Walkinshaw [6] proposed a format extraction algorithm based on message segmentation (segment-based NW) in order to avoid the decision error caused by different message lengths. e basic idea is that the packets are compared by multiple sequences based on segmentation, and then the analysis results are combined by weighted coefficients.…”
Section: Related Workmentioning
confidence: 99%
“…One relevant related paper uses sequence alignment algorithms on the contents of unencrypted packets in order to infer the contents of similar segments [23]. This technique applies to the plain-text contents of the packets.…”
Section: Related Workmentioning
confidence: 99%