Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View

Full metadata record
DC Field Value Language
dc.contributor.authorSija, Baraka D.-
dc.contributor.authorGoo, Young-Hoon-
dc.contributor.authorShim, Kyu-Seok-
dc.contributor.authorHasanova, Huru-
dc.contributor.authorKim, Myung-Sup-
dc.date.accessioned2021-12-19T07:40:25Z-
dc.date.available2021-12-19T07:40:25Z-
dc.date.created2021-08-30-
dc.date.issued2018-
dc.identifier.issn1939-0114-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/132145-
dc.description.abstractA network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches' outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers' OSI (Open Systems Interconnection) model.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.titleA Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View-
dc.typeArticle-
dc.contributor.affiliatedAuthorKim, Myung-Sup-
dc.identifier.doi10.1155/2018/8370341-
dc.identifier.scopusid2-s2.0-85043380967-
dc.identifier.wosid000426640500001-
dc.identifier.bibliographicCitationSECURITY AND COMMUNICATION NETWORKS-
dc.relation.isPartOfSECURITY AND COMMUNICATION NETWORKS-
dc.citation.titleSECURITY AND COMMUNICATION NETWORKS-
dc.type.rimsART-
dc.type.docTypeReview-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer and Information Science > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher KIM, MYUNG SUP photo

KIM, MYUNG SUP
컴퓨터정보학과
Read more

Altmetrics

Total Views & Downloads

BROWSE