计算机科学
协议(科学)
分割
领域(数学)
网络数据包
数据挖掘
逆向工程
入侵检测系统
人工智能
计算机网络
数学
医学
病理
程序设计语言
纯数学
替代医学
作者
Fanghui Sun,Shen Wang,Chunrui Zhang,Hongli Zhang
标识
DOI:10.1016/j.comcom.2019.06.013
摘要
In network security systems working on intrusion detection, deep packet inspection, and protocol fuzzing, protocol specifications analyzed by Protocol Reverse Engineering(PRE) play an important role as fundamental input. For binary protocols having fixed-length fields, the location of those field boundaries has great impact on the subsequent analysis as well as the final performance. In this paper, we discuss the field segmentation problem formally, and develop a reasonable method ProSeg by introducing and optimize statistics(self-information and mutual information) from Information Theory. By analyzing the format structure of messages from unknown protocol vertically, the boundaries of fixed-length fields could be located by an expert voting strategy successfully. In experiments and analysis on several common protocols, our method turns out to be effective relatively and the results of ProSeg are consistent with standard segmentations to a great extent.
科研通智能强力驱动
Strongly Powered by AbleSci AI