Protocol clustering of unknown traffic based on embedding of protocol specification

被引:0
|
作者
Li, Junchen [1 ,2 ]
Cheng, Guang [1 ,2 ,3 ]
Chen, Zongyao [1 ]
Zhao, Peng [1 ,2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[2] Jiangsu Prov Engn Res Ctr Secur Ubiquitous Network, Nanjing 211189, Peoples R China
[3] Purple Mt Labs, Nanjing 211111, Peoples R China
基金
中国国家自然科学基金;
关键词
Private protocols; Unknown traffic; Protocol reverse engineering; Embedding; Unsupervised clustering;
D O I
10.1016/j.cose.2023.103575
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protocol Reverse Engineering (PRE) has been widely studied in recent years as the most direct approach for analyzing unknown traffic, which is predominantly generated by private protocols. With the increase in private protocols, network traffic keeps deepening the unknown, leading to supervised learning methods struggling to obtain effective models when prior knowledge is absent. Furthermore, the unknown traffic captured in the real-world environment is actually mixed, and it cannot be directly provided to PRE for further analysis due to the lack of labels associated with private protocols. To address this issue in PRE, we propose an approach for dividing the unknown traffic into clusters with the labels of different private protocols in this paper, named FEAC. Firstly, we propose the general structure of protocol specification through an extensive investigation of protocols. Then, the unknown traffic is characterized as the Protocol Specification Fusion Vector (PSFV) based on word embedding, fusing the multidimensional information of protocol specification introduced before. After that, representation learning is employed in refining the information of the PSFVs to compress the dimension, reducing the complexity of computation. Finally, we combine the refined PSFVs and DBSCAN algorithm to implement the protocol clustering of unknown traffic, improving the analysis ability of PRE on unknown traffic. We carry out comprehensive experiments for comparison on real-world network traffic, and the experimental results demonstrate that FEAC achieves the ideal clustering performance and has advantages over previous work.
引用
收藏
页数:11
相关论文
共 50 条
  • [22] A Knowledge-Based Specification Technique for Protocol Development
    张尧学
    史美林
    Norio Shiratori
    JournalofComputerScienceandTechnology, 1993, (02) : 188 - 192
  • [23] PROTOCOL SPECIFICATION, TESTING AND VERIFICATION
    不详
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1984, 8 (01): : 57 - 65
  • [24] PROTOCOL SPECIFICATION, TESTING AND VERIFICATION
    不详
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1984, 8 (02): : 146 - 155
  • [25] THE DIMENSION OF TIME IN PROTOCOL SPECIFICATION
    RUDIN, H
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 248 : 360 - 372
  • [26] A node-traffic characteristics considered clustering broadcast protocol for VANETs
    Zhou, Lianke
    Zuo, Decheng
    Cui, Gang
    Liu, Hongwei
    Gaojishu Tongxin/Chinese High Technology Letters, 2012, 22 (05): : 468 - 476
  • [27] Executable protocol specification in ESL
    Clarke, E
    German, S
    Lu, Y
    Veith, H
    Wang, D
    FORMAL METHODS IN COMPUTER-AIDED DESIGN, PROCEEDINGS, 2000, 1954 : 197 - 216
  • [28] PROTOCOL SPECIFICATION, TESTING AND VERIFICATION
    不详
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1985, 10 (3-4): : 231 - 237
  • [29] Prospex: Protocol Specification Extraction
    Comparetti, Paolo Milani
    Wondracek, Gilbert
    Kruegel, Christopher
    Kirda, Engin
    PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 110 - +
  • [30] Formal specification of a protocol processor
    Westerlund, T
    Plosila, J
    EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING, AND SIMULATION, 2005, 3553 : 122 - 131