Protocol clustering of unknown traffic based on embedding of protocol specification

被引:0
|
作者
Li, Junchen [1 ,2 ]
Cheng, Guang [1 ,2 ,3 ]
Chen, Zongyao [1 ]
Zhao, Peng [1 ,2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[2] Jiangsu Prov Engn Res Ctr Secur Ubiquitous Network, Nanjing 211189, Peoples R China
[3] Purple Mt Labs, Nanjing 211111, Peoples R China
基金
中国国家自然科学基金;
关键词
Private protocols; Unknown traffic; Protocol reverse engineering; Embedding; Unsupervised clustering;
D O I
10.1016/j.cose.2023.103575
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protocol Reverse Engineering (PRE) has been widely studied in recent years as the most direct approach for analyzing unknown traffic, which is predominantly generated by private protocols. With the increase in private protocols, network traffic keeps deepening the unknown, leading to supervised learning methods struggling to obtain effective models when prior knowledge is absent. Furthermore, the unknown traffic captured in the real-world environment is actually mixed, and it cannot be directly provided to PRE for further analysis due to the lack of labels associated with private protocols. To address this issue in PRE, we propose an approach for dividing the unknown traffic into clusters with the labels of different private protocols in this paper, named FEAC. Firstly, we propose the general structure of protocol specification through an extensive investigation of protocols. Then, the unknown traffic is characterized as the Protocol Specification Fusion Vector (PSFV) based on word embedding, fusing the multidimensional information of protocol specification introduced before. After that, representation learning is employed in refining the information of the PSFVs to compress the dimension, reducing the complexity of computation. Finally, we combine the refined PSFVs and DBSCAN algorithm to implement the protocol clustering of unknown traffic, improving the analysis ability of PRE on unknown traffic. We carry out comprehensive experiments for comparison on real-world network traffic, and the experimental results demonstrate that FEAC achieves the ideal clustering performance and has advantages over previous work.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] An Unknown Protocol Clustering Analysis Method Based on Spectral Clustering
    Ni, Lulin
    Shi, Yu
    Luo, Jie
    Ji, Qingbing
    2021 IEEE 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2021), 2021, : 445 - 449
  • [2] Clustering of unknown protocol messages based on format comparison
    Sun, Fanghui
    Wang, Shen
    Zhang, Chunrui
    Zhang, Hongli
    COMPUTER NETWORKS, 2020, 179
  • [3] Identification of Unknown Protocol Traffic Based on Deep Learning
    Ma, Ruolong
    Qin, Sujuan
    PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1195 - 1198
  • [4] Unknown Application Layer Protocol Recognition Method Based on Deep Clustering
    Wu, Jisheng
    Hong, Zheng
    Ma, Tiantian
    Si, Jianpeng
    CHINA COMMUNICATIONS, 2024, 21 (12) : 275 - 296
  • [5] Unknown Application Layer Protocol Recognition Method Based on Deep Clustering
    Wu Jisheng
    Hong Zheng
    Ma Tiantian
    Si Jianpeng
    China Communications, 2024, 21 (12) : 275 - 296
  • [6] VTCP: A Clustering Protocol Based on Traffic Flow States for Vehicular Networks
    Shi Yan
    Lu Changkai
    Huang Xiaohong
    Lu Meilian
    Qiao Liqiang
    Chen Shanzhi
    INTERNET OF VEHICLES - TECHNOLOGIES AND SERVICES, 2016, 10036 : 107 - 119
  • [7] Model-based protocol specification
    Mordecai, Yaniv
    SYSTEMS ENGINEERING, 2019, 22 (02) : 188 - 210
  • [8] Specification-based Protocol Obfuscation
    Duchene, Julien
    Alata, Eric
    Nicomette, Vincent
    Kaaniche, Mohamed
    Le Guernic, Colas
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 478 - 489
  • [9] An unknown Protocol improved k-means clustering algorithm based on Pearson distance
    Yin, Shizhuang
    Wang, Tao
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (04) : 4901 - 4913
  • [10] Automatic modification of a protocol specification based on changes of a service specification
    Go, K
    Takahashi, K
    Kaminaga, H
    Shiratori, N
    1996 INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, PROCEEDINGS, 1996, : 129 - 134