Wireless Communications and Applications. First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers

Research Article

How Network Reverse Engineering Differs from Software Reverse Engineering

Download
323 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-29157-9_4,
        author={Hui Zhou and Wencai Du},
        title={How Network Reverse Engineering Differs from Software Reverse Engineering},
        proceedings={Wireless Communications and Applications. First International Conference, ICWCA 2011, Sanya, China, August 1-3, 2011, Revised Selected Papers},
        proceedings_a={ICWCA},
        year={2012},
        month={5},
        keywords={Network reverse engineering software reverse engineering},
        doi={10.1007/978-3-642-29157-9_4}
    }
    
  • Hui Zhou
    Wencai Du
    Year: 2012
    How Network Reverse Engineering Differs from Software Reverse Engineering
    ICWCA
    Springer
    DOI: 10.1007/978-3-642-29157-9_4
Hui Zhou1,*, Wencai Du1,*
  • 1: Hainan University
*Contact email: h.zhou.china@gmail.com, wencai@hainu.edu.cn

Abstract

Software reverse engineering has undergone many milestones and stepped from research to industry quickly in recent ten years. By analogy, researchers have found that it is also possible to apply reverse engineering to computer networks. The goal of network reverse engineering is to annotate a living map of the networks, which exhibits node role, link connectivity, topology dynamics, and bandwidth usage. It is necessary, but also challenging, to employ reverse engineering to computer network. We present an comparatively analysis on the reverse engineering of both software and network from five fundamental perspectives: source, analysis, presentation, validation, and prediction. The comparison indicates that both software and network communities would benefit from the collaborative effort on reverse engineering.