Protocol clustering of unknown traffic based on embedding of protocol specification

被引:0
|
作者
Li, Junchen [1 ,2 ]
Cheng, Guang [1 ,2 ,3 ]
Chen, Zongyao [1 ]
Zhao, Peng [1 ,2 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 211189, Peoples R China
[2] Jiangsu Prov Engn Res Ctr Secur Ubiquitous Network, Nanjing 211189, Peoples R China
[3] Purple Mt Labs, Nanjing 211111, Peoples R China
基金
中国国家自然科学基金;
关键词
Private protocols; Unknown traffic; Protocol reverse engineering; Embedding; Unsupervised clustering;
D O I
10.1016/j.cose.2023.103575
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protocol Reverse Engineering (PRE) has been widely studied in recent years as the most direct approach for analyzing unknown traffic, which is predominantly generated by private protocols. With the increase in private protocols, network traffic keeps deepening the unknown, leading to supervised learning methods struggling to obtain effective models when prior knowledge is absent. Furthermore, the unknown traffic captured in the real-world environment is actually mixed, and it cannot be directly provided to PRE for further analysis due to the lack of labels associated with private protocols. To address this issue in PRE, we propose an approach for dividing the unknown traffic into clusters with the labels of different private protocols in this paper, named FEAC. Firstly, we propose the general structure of protocol specification through an extensive investigation of protocols. Then, the unknown traffic is characterized as the Protocol Specification Fusion Vector (PSFV) based on word embedding, fusing the multidimensional information of protocol specification introduced before. After that, representation learning is employed in refining the information of the PSFVs to compress the dimension, reducing the complexity of computation. Finally, we combine the refined PSFVs and DBSCAN algorithm to implement the protocol clustering of unknown traffic, improving the analysis ability of PRE on unknown traffic. We carry out comprehensive experiments for comparison on real-world network traffic, and the experimental results demonstrate that FEAC achieves the ideal clustering performance and has advantages over previous work.
引用
收藏
页数:11
相关论文
共 50 条
  • [41] A New Clustering Mechanism Based On LEACH Protocol
    Liu, Yuhua
    Zhao, Yongfeng
    Gao, Jingju
    FIRST IITA INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2009, : 715 - 718
  • [42] Acceptability Based Clustering Routing Protocol in MANET
    Saha, Himadri Nath
    Chatterjee, Avimita
    Chatterje, Baisakhi
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 1172 - 1180
  • [43] The Research of Protocol Identification Based on Traffic Analysis
    Shao Zuozhi
    Yan Yue
    Min Yunlang
    2017 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2017), 2017, : 172 - 175
  • [44] Analysis of Web Traffic Based on HTTP Protocol
    Chen, Jiajia
    Cheng, Weiqing
    2016 24TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2016, : 279 - 283
  • [45] Traffic Type Recognition Method for Unknown Protocol-Applying Fuzzy Inference
    Kim, Sang-Won
    Kim, Kee-Cheon
    ELECTRONICS, 2021, 10 (01) : 1 - 19
  • [46] Measuring the maintainability of a communication protocol based on its formal specification
    Huang, SJ
    Lai, R
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2003, 29 (04) : 327 - 344
  • [47] Raft Protocol Testing Based on TLA+ Formal Specification
    Wang, Dong
    Dou, Wen-Sheng
    Gao, Yu
    Wu, Chen-Ao
    Wei, Jun
    Huang, Tao
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (12): : 5363 - 5381
  • [48] Protocol Specification Extraction Based on Contiguous Sequential Pattern Algorithm
    Goo, Young-Noon
    Shim, Kyu-Seok
    Lee, Min-Seob
    Kim, Myung-Sup
    IEEE ACCESS, 2019, 7 : 36057 - 36074
  • [49] A role-based specification of the SET payment transaction protocol
    Sakurada, H
    Tsukada, Y
    ADVANCES IN NETWORK AND DISTRIBUTED SYSTEMS SECURITY, 2001, 78 : 1 - 13
  • [50] A study on unknown protocol security
    Lee, Seungho
    Song, Wonjong
    Kim, Keechoen
    2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), 2020, : 660 - 662