首页> 外文会议>International Conference on Complex, Intelligent and Software Intensive Systems >Hybrid Analysis for Mining Network Protocol's Hidden Behavior
【24h】

Hybrid Analysis for Mining Network Protocol's Hidden Behavior

机译:挖掘网络协议隐藏行为的混合分析

获取原文

摘要

Reverse unknown protocol's hidden behavior has played an important role in the field of network security. The proposed work takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the virtual platform HiddenDisc prototype system developed by ourselves, record the protocol's public behavior, then based on our proposed Hidden Behavior Perception and Mining algorithm, static analyze the protocol's hidden behavior trigger conditions and hidden behavior instruction sequences. According to the hidden behavior trigger conditions, new protocol messages with the sensitive information are generated, and the hidden behaviors are executed by dynamic triggering. HiddenDisc prototype system can sense, trigger and analyze the protocol's hidden behaviors. According to the statistical analysis results, we propose the evaluation method of Protocol Execution Security. The experimental results show that the present method can accurately mining the protocol's hidden behaviors, and can evaluate unknown protocol's execution security.
机译:反向未知协议的隐藏行为在网络安全领域中发挥了重要作用。拟议的工作将捕获的消息和实现协议的二进制代码都作为研究对象。动态污点分析与静态分析相结合用于协议分析。首先,监视和分析协议程序的过程,在自己开发的虚拟平台HiddenDisc原型系统中解析消息,记录协议的公共行为,然后基于我们提出的“隐藏行为感知和挖掘”算法,静态分析协议的隐藏行为触发条件和隐藏行为指令序列。根据隐藏行为触发条件,生成带有敏感信息的新协议消息,并通过动态触发执行隐藏行为。 HiddenDisc原型系统可以感知,触发和分析协议的隐藏行为。根据统计分析结果,提出了协议执行安全性的评估方法。实验结果表明,该方法可以准确地挖掘协议的隐藏行为,并可以评估未知协议的执行安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号