【24h】

Traffic to Protocol Reverse Engineering

机译:交通协议逆向工程

获取原文

摘要

Network Protocol Reverse Engineering (NPRE) has played an increasing role in honeypot operations. It allows to automatically generate Statemodels and scripts being able to act as realistic counterpart for capturing unknown mal-ware. This work proposes a novel approach in the field of NPRE. By passively listening to network traces, our system automatically derives the protocol state machines of the peers involved allowing the analyst to understand its intrinsic logic. We present a new methodology to extract the relevant fields from arbitrary binary protocols to construct a statemodel. We prove our methodology by deriving the statemachine of documented protocols ARP, DHCP and TCP. We then apply it to Kademlia, the results show the usefulness to support binary reverse engineering processes and detect a new undocumented feature.
机译:网络协议逆向工程(NPRE)在蜜罐操作中发挥了越来越大的作用。它允许自动生成StateModel,并且脚本能够充当捕获未知的MAL-ware的现实对应物。这项工作提出了一种在NPRE领域的新方法。通过被动地侦听网络迹线,我们的系统会自动派生对等体的协议状态机,允许分析师理解其内在逻辑。我们提出了一种新的方法来从任意二进制协议中提取相关字段来构建StateModel。我们通过派生记录的协议ARP,DHCP和TCP的StateMachine来证明我们的方法。然后,我们将其应用于kademlia,结果显示了支持二进制逆向工程流程并检测新的无证特征的有用性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号