Two-Pathway Model for Enhancement of Protocol Reverse Engineering
- Authors
- Goo, Young-Hoon; Shim, Kyu-Seok; Baek, Ui-Jun; Kim, Myung-Sup
- Issue Date
- 30-11월-2020
- Publisher
- KSII-KOR SOC INTERNET INFORMATION
- Keywords
- Protocol reverse engineering; network security; two-pathway model; contiguous sequential pattern algorithm; command-oriented protocols br
- Citation
- KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.14, no.11, pp.4310 - 4330
- Indexed
- SCIE
SCOPUS
KCI
- Journal Title
- KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS
- Volume
- 14
- Number
- 11
- Start Page
- 4310
- End Page
- 4330
- URI
- https://scholar.korea.ac.kr/handle/2021.sw.korea/51437
- DOI
- 10.3837/tiis.2020.11.004
- ISSN
- 1976-7277
- Abstract
- With the continuous emergence of new applications and cyberattacks and their frequent updates, the need for automatic protocol reverse engineering is gaining recognition. Although several methods for automatic protocol reverse engineering have been proposed, each method still faces major limitations in extracting clear specifications and in its universal application. In order to overcome such limitations, we propose an automatic protocol reverse engineering method using a two-pathway model based on a contiguous sequential pattern (CSP) algorithm. By using this model, the method can infer both command-oriented protocols and non-command-oriented protocols clearly and in detail. The proposed method infers all the key elements of the protocol, which are syntax, semantics, and finite state machine (FSM), and extracts clear syntax by defining fine-grained field types and three types of format: field format, message format, and flow format. We evaluated the efficacy of the proposed method over two non-command-oriented protocols and three command oriented protocols: the former are HTTP and DNS, and the latter are FTP, SMTP, and POP3. The experimental results show that this method can reverse engineer with high coverage and correctness rates, more than 98.5% and 99.1% respectively, and be general for both command-oriented and non-command-oriented protocols.
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - Graduate School > Department of Computer and Information Science > 1. Journal Articles
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.