Protocol clustering of unknown traffic based on embedding of protocol specification

被引:0
|
作者
Li, Junchen [1 ,2 ]
Cheng, Guang [1 ,2 ,3 ]
Chen, Zongyao [1 ]
Zhao, Peng [1 ,2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[2] Jiangsu Prov Engn Res Ctr Secur Ubiquitous Network, Nanjing 211189, Peoples R China
[3] Purple Mt Labs, Nanjing 211111, Peoples R China
基金
中国国家自然科学基金;
关键词
Private protocols; Unknown traffic; Protocol reverse engineering; Embedding; Unsupervised clustering;
D O I
10.1016/j.cose.2023.103575
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protocol Reverse Engineering (PRE) has been widely studied in recent years as the most direct approach for analyzing unknown traffic, which is predominantly generated by private protocols. With the increase in private protocols, network traffic keeps deepening the unknown, leading to supervised learning methods struggling to obtain effective models when prior knowledge is absent. Furthermore, the unknown traffic captured in the real-world environment is actually mixed, and it cannot be directly provided to PRE for further analysis due to the lack of labels associated with private protocols. To address this issue in PRE, we propose an approach for dividing the unknown traffic into clusters with the labels of different private protocols in this paper, named FEAC. Firstly, we propose the general structure of protocol specification through an extensive investigation of protocols. Then, the unknown traffic is characterized as the Protocol Specification Fusion Vector (PSFV) based on word embedding, fusing the multidimensional information of protocol specification introduced before. After that, representation learning is employed in refining the information of the PSFVs to compress the dimension, reducing the complexity of computation. Finally, we combine the refined PSFVs and DBSCAN algorithm to implement the protocol clustering of unknown traffic, improving the analysis ability of PRE on unknown traffic. We carry out comprehensive experiments for comparison on real-world network traffic, and the experimental results demonstrate that FEAC achieves the ideal clustering performance and has advantages over previous work.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] TECHNIQUE FOR VALIDATING PROTOCOL SPECIFICATION
    RAKOVA, IK
    SMIRNOVA, NN
    AVTOMATIKA I VYCHISLITELNAYA TEKHNIKA, 1986, (06): : 39 - 43
  • [32] Typestate Protocol Specification in JML
    Kim, Taekgoo
    Bierhoff, Kevin
    Aldrich, Jonathan
    Kang, Sungwon
    EIGHTH WORKSHOP ON SPECIFICATION AND VERIFICATION OF COMPONENT-BASED SYSTEMS-SAVCBS 2009, 2009, : 11 - 18
  • [33] ISSUES AND TOOLS FOR PROTOCOL SPECIFICATION
    ANSART, JP
    LECTURE NOTES IN COMPUTER SCIENCE, 1985, 190 : 481 - 538
  • [34] Broadcast monitoring protocol based on secure watermark embedding
    Liu, Li
    Guan, Tao
    Zhang, Zutao
    COMPUTERS & ELECTRICAL ENGINEERING, 2013, 39 (07) : 2299 - 2305
  • [35] An Optimized AODV Protocol Based on Clustering for WSNs
    Feng, Yan
    Zhang, Baihai
    Chai, Senchun
    Cui, Lingguo
    Li, Qiao
    PROCEEDINGS OF 2017 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2017), 2017, : 410 - 414
  • [36] MPMAC: Clustering Based MAC Protocol for VANETs
    Brijesh Kumar Chaurasia
    Md. Iftekhar Alam
    Arun Prakash
    Ranjeet Singh Tomar
    Shekhar Verma
    Wireless Personal Communications, 2019, 108 : 409 - 436
  • [37] MPMAC: Clustering Based MAC Protocol for VANETs
    Chaurasia, Brijesh Kumar
    Alam, Md. Iftekhar
    Prakash, Arun
    Tomar, Ranjeet Singh
    Verma, Shekhar
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 108 (01) : 409 - 436
  • [38] A new AODV based clustering routing protocol
    Zheng, K
    Wang, N
    Liu, AF
    2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 682 - 685
  • [39] A Clustering Routing Protocol based on HCMC in WSNs
    Sun, Jifeng
    Liao, Fan
    Peng, Yao
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 577 - 581
  • [40] Research on the routing protocol based on grid clustering
    Lv, Jun
    Li, Tong
    Huang, Qingsong
    Qu, Jinbiao
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,