计算机科学
跟踪(心理语言学)
逆向工程
协议(科学)
特征(语言学)
过程(计算)
代表(政治)
数据科学
透视图(图形)
软件工程
数据挖掘
人工智能
哲学
替代医学
法学
程序设计语言
病理
操作系统
政治
医学
语言学
政治学
作者
Yuyao Huang,Hui Shu,Fei Kang,Yan Guang
标识
DOI:10.1016/j.comcom.2021.11.009
摘要
The widespread utilization of network protocols raises many security and privacy concerns. To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse domains, such as network management, security validation, and software analysis, by mining protocol specifications. This paper surveys the existing PRE methods and tools, which are based on network trace (NetT) or execution trace (ExeT), according to features representation. The feature-based protocol classification is proposed for the first time in literature to describe and compare different tools more clearly from a new perspective and to inspire crossover approaches in future works. We analyze the rationale, genealogy, contributions, and properties of 74 representative PRE methods/tools developed since 2004. In addition, we extend the general process of the PRE from a feature perspective and provide a detailed evaluation of the well-known methods/tools. Finally, we highlight the open issues and future research directions.
科研通智能强力驱动
Strongly Powered by AbleSci AI