About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Collaborative Computing: Networking, Applications and Worksharing. 17th EAI International Conference, CollaborateCom 2021, Virtual Event, October 16-18, 2021, Proceedings, Part I

Research Article

Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering

Download(Requires a free EAI acccount)
2 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-92635-9_21,
        author={Yige Chen and Tianning Zang and Yongzheng Zhang and Yuan Zhou and Peng Yang and Yipeng Wang},
        title={Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering},
        proceedings={Collaborative Computing: Networking, Applications and Worksharing. 17th EAI International Conference, CollaborateCom 2021, Virtual Event, October 16-18, 2021, Proceedings, Part I},
        proceedings_a={COLLABORATECOM},
        year={2022},
        month={1},
        keywords={Protocol reverse engineering Protocol format inference Binary protocol Semantic fields},
        doi={10.1007/978-3-030-92635-9_21}
    }
    
  • Yige Chen
    Tianning Zang
    Yongzheng Zhang
    Yuan Zhou
    Peng Yang
    Yipeng Wang
    Year: 2022
    Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering
    COLLABORATECOM
    Springer
    DOI: 10.1007/978-3-030-92635-9_21
Yige Chen1, Tianning Zang1, Yongzheng Zhang1, Yuan Zhou, Peng Yang,*, Yipeng Wang
  • 1: Institute of Information Engineering
*Contact email: yp@cert.org.cn

Abstract

The automatic protocol reverse engineering for undocumented network protocols is important for many fundamental network security applications, such as intrusion prevention and detection. With the growing prevalence of binary protocols in the network communication to organize data in a terse format and ensure data integrity, the proven reverse approaches for ordinary text protocols face severe challenges in the compatibility. In this paper, we propose Inspector, an automatic protocol reverse engineering approach that exploits semantic fields to infer message formats from binary network traces. Inspector reasonably infers two semantic fields based on the binary content analysis of protocol messages to support clustering messages and message format inference. We evaluate the effectiveness of Inspector on two binary cryptographic protocols (TLS and SSH) and a binary unencrypted protocol MQTT by measuring the accuracy of message clustering and comparing the inferred message formats with the ground truths on a traffic dataset captured from a campus. Our experimental results show that Inspector accurately cluster messages with 100% cluster precision and 100% message recall for TLS, 90% cluster precision and 99.6% message recall for SSH, 100% cluster precision and 92.7% message recall for MQTT. Based on the accurate message clusters, Inspector can correctly infer the format of the messages in the cluster.

Keywords
Protocol reverse engineering Protocol format inference Binary protocol Semantic fields
Published
2022-01-01
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-92635-9_21
Copyright © 2021–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL