Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Two-Pathway Model for Enhancement of Protocol Reverse Engineering

Authors
Goo, Young-HoonShim, Kyu-SeokBaek, Ui-JunKim, Myung-Sup
Issue Date
30-11월-2020
Publisher
KSII-KOR SOC INTERNET INFORMATION
Keywords
Protocol reverse engineering; network security; two-pathway model; contiguous sequential pattern algorithm; command-oriented protocols br
Citation
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.14, no.11, pp.4310 - 4330
Indexed
SCIE
SCOPUS
KCI
Journal Title
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
Volume
14
Number
11
Start Page
4310
End Page
4330
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/51437
DOI
10.3837/tiis.2020.11.004
ISSN
1976-7277
Abstract
With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations in extracting clear specifications and in its universal application. In order to overcome such limitations, we propose an automatic protocol reverse engineering method using a two-pathway model based on a contiguous sequential pattern (CSP) algorithm. By using this model, the method can infer both command-oriented protocols and non-command-oriented protocols clearly and in detail. The proposed method infers all the key elements of the protocol, which are syntax, semantics, and finite state machine (FSM), and extracts clear syntax by defining fine-grained field types and three types of format: field format, message format, and flow format. We evaluated the efficacy of the proposed method over two non-command-oriented protocols and three command oriented protocols: the former are HTTP and DNS, and the latter are FTP, SMTP, and POP3. The experimental results show that this method can reverse engineer with high coverage and correctness rates, more than 98.5% and 99.1% respectively, and be general for both command-oriented and non-command-oriented protocols.
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer and Information Science > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher KIM, MYUNG SUP photo

KIM, MYUNG SUP
컴퓨터정보학과
Read more

Altmetrics

Total Views & Downloads

BROWSE