ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse Engineering

Author(s):  
Dongxiao Jiang ◽  
Chenggang Li ◽  
Lixin Ma ◽  
Xiaoyu Ji ◽  
Yanjiao Chen ◽  
...  
2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Ran Ji ◽  
Jian Wang ◽  
Chaojing Tang ◽  
Ruilin Li

The increasing use of civil unmanned aerial vehicles (UAVs) has the potential to threaten public safety and privacy. Therefore, airspace administrators urgently need an effective method to regulate UAVs. Understanding the meaning and format of UAV flight control commands by automatic protocol reverse-engineering techniques is highly beneficial to UAV regulation. To improve our understanding of the meaning and format of UAV flight control commands, this paper proposes a method to automatically analyze the private flight control protocols of UAVs. First, we classify flight control commands collected from a binary network trace into clusters; then, we analyze the meaning of flight control commands by the accumulated error of each cluster; next, we extract the binary format of commands and infer field semantics in these commands; and finally, we infer the location of the check field in command and the generator polynomial matrix. The proposed approach is validated via experiments on a widely used consumer UAV.


2014 ◽  
Vol 513-517 ◽  
pp. 2496-2501
Author(s):  
Li Hua Zhao ◽  
Xue Jia Liang ◽  
Xiang Peng ◽  
Hua Feng Kong ◽  
Mei Zhen Wang

To infer the network protocol state machine is very useful in network security-related contexts, both in research and management. This process follows an extension of the classic Angluins L* algorithm and has achieved an extended version of some Mealy automata to represent or model a communication protocol. The algorithm has been validated by inferring the protocol state machine from SMTPFTP protocol, and tested offline algorithms for the comparison experiments. The experimental results show that this method can more accurately identify the network protocol state machine and is of the important application value.


Sensors ◽  
2019 ◽  
Vol 19 (3) ◽  
pp. 716 ◽  
Author(s):  
Xin Luo ◽  
Dan Chen ◽  
Yongjun Wang ◽  
Peidai Xie

Protocol Reverse Engineering (PRE) is crucial for information security of Internet-of-Things (IoT), and message clustering determines the effectiveness of PRE. However, the quality of services still lags behind the strict requirement of IoT applications as the results of message clustering are often coarse-grained with the intrinsic type information hidden in messages largely ignored. Aiming at this problem, this study proposes a type-aware approach to message clustering guided by type information. The approach regards a message as a combination of n-grams, and it employs the Latent Dirichlet Allocation (LDA) model to characterize messages with types and n-grams via inferring the type distribution of each message. The type distribution is finally used to measure the similarity of messages. According to this similarity, the approach clusters messages and further extracts message formats. Experimental results of the approach against Netzob in terms of a number of protocols indicate that the correctness and conciseness can be significantly improved, e.g., figures 43.86% and 3.87%, respectively for the CoAP protocol.


Sign in / Sign up

Export Citation Format

Share Document