Back to Search Start Over

Survey of Automatic Protocol Reverse Engineering Tools.

Authors :
NARAYAN, JOHN
SHUKLA, SANDEEP K.
CLANCY, T. CHARLES
Source :
ACM Computing Surveys. Feb2016, Vol. 48 Issue 3, p40:1-40:26. 26p. 5 Diagrams, 7 Charts.
Publication Year :
2016

Abstract

Computer network protocols define the rules in which two entities communicate over a network of unique hosts. Many protocol specifications are unknown, unavailable, or minimally documented, which prevents thorough analysis of the protocol for security purposes. For example, modern botnets often use undocumented and unique application-layer communication protocols to maintain command and control over numerous distributed hosts. Inferring the specification of closed protocols has numerous advantages, such as intelligent deep packet inspection, enhanced intrusion detection system algorithms for communications, and integration with legacy software packages. Themultitude of closed protocols coupled with existing time-intensive reverse engineering methodologies has spawned investigation into automated approaches for reverse engineering of closed protocols. This article summarizes and organizes previously presented automatic protocol reverse engineering tools by approach. Approaches that focus on reverse engineering the finite state machine of a target protocol are separated from those that focus on reverse engineering the protocol format. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
03600300
Volume :
48
Issue :
3
Database :
Academic Search Index
Journal :
ACM Computing Surveys
Publication Type :
Academic Journal
Accession number :
111508718
Full Text :
https://doi.org/10.1145/2840724