首页> 外文期刊>Parallel algorithms and applications >IPART: an automatic protocol reverse engineering tool based on global voting expert for industrial protocols
【24h】

IPART: an automatic protocol reverse engineering tool based on global voting expert for industrial protocols

机译:iPart:基于全球投票专家的自动协议逆向工程工业协议

获取原文
获取原文并翻译 | 示例

摘要

ABSTRACT The industrial control system is an important part of many critical infrastructures and has a big influence on the security of them. With the rapid development of the industrial control system, there has been a significant increase for industrial control system to use the computer network, which has brought many security issues. Protocol security is one of the most important security issues. Many industrial protocols are unknown, which prevent firewall parsing and analysing network traffic, thus it brings a big challenge for intrusion detection, deep packet inspection and traffic management. One method to solve the problem is the reverse engineering technology. However, previous works are mainly for traditional network protocols and not very suitable for reversing industrial protocols. To address this problem, we propose IPART, an unsupervised tool for automatically reverse the format of the industrial protocol from network trace. IPART applies an extended voting expert algorithm to infer the boundaries of industrial protocol fields. Types of these fields are derived by statistical methods. It then classifies messages into sub-clusters by their field types and infers the format of each sub-cluster. Finally, IPART combines all results and gets the format tree of the protocol. We evaluate our work on three industrial protocols: Modbus, IEC104 and Ethernet/IP. Compared with some state-of-art approaches (lda model, Voting expert, netzob), our tool shows a better performance.IPART reverse industrial protocols mainly by three stages. The tool firstly split raw packages into tokens and infer the fields of the protocol. Both fields property (offset, length, etc.) and semantic (length, transition id, etc.). It then class messages belong to the same format to a cluster and each cluster approximates a format. Finally, the tool combines all formats and get the protocol format tree.
机译:摘要工业控制系统是许多关键基础设施的重要组成部分,对它们的安全有很大影响。随着工业控制系统的快速发展,工业控制系统使用计算机网络的显着增加,这带来了许多安全问题。协议安全是最重要的安全问题之一。许多工业协议都是未知的,防止防火墙解析和分析网络流量,因此它为入侵检测,深度分组检测和交通管理带来了重大挑战。解决问题的一种方法是逆向工程技术。然而,以前的作品主要用于传统网络协议,而不是非常适合逆转工业协议。为了解决这个问题,我们提出了Ipart,一个无人监督的工具,用于自动反转从网络跟踪的工业协议格式。 iPart应用扩展的投票专家算法来推断工业协议字段的边界。这些字段的类型通过统计方法导出。然后,它通过其字段类型将消息分类为子群,并且infers的每个子群集的格式。最后,Ipart结合了所有结果并获取协议的格式树。我们评估我们三个工业协议的工作:Modbus,IEC104和以太网/ IP。与某些最先进的方法(LDA模型,投票专家,Netzob)相比,我们的工具显示了更好的性能.IPART主要是三个阶段的逆向工业协议。该工具首先将原始包拆分为令牌并推断协议的字段。两个字段属性(偏移,长度等)和语义(长度,转换ID等)。然后,类消息属于与群集相同的格式,每个群集近似于格式。最后,该工具结合了所有格式并获取协议格式树。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号