Protocol reverse-engineering methods and tools: A survey
Y Huang, H Shu, F Kang, Y Guang - Computer Communications, 2022 - Elsevier
The widespread utilization of network protocols raises many security and privacy concerns.
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …
A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view
A network protocol defines rules that control communications between two or more
machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines …
machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines …
Khaos: An adversarial neural network DGA with high anti-detection ability
X Yun, J Huang, Y Wang, T Zang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
A botnet is a network of remote-controlled devices that are infected with malware controlled
by botmasters in order to launch cyber attacks. To evade detection, the botmaster frequently …
by botmasters in order to launch cyber attacks. To evade detection, the botmaster frequently …
Detecting domain generation algorithms with convolutional neural language models
J Huang, P Wang, T Zang, Q Qiang… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
To evade detection, botnets apply DNS domain fluxing for Command and Control (C&C)
servers. In this way, each bot generates a large number of domain names with Domain …
servers. In this way, each bot generates a large number of domain names with Domain …
CCGA: clustering and capturing group activities for DGA-based botnets detection
Z Liu, X Yun, Y Zhang, Y Wang - 2019 18th IEEE International …, 2019 - ieeexplore.ieee.org
Botnet is a part of the most destructive threats to network security and is often used in
malicious activities. DGA-based botnet, which uses Domain Generation Algorithm (DGA) to …
malicious activities. DGA-based botnet, which uses Domain Generation Algorithm (DGA) to …
A type-aware approach to message clustering for protocol reverse engineering
X Luo, D Chen, Y Wang, P Xie - Sensors, 2019 - mdpi.com
Protocol Reverse Engineering (PRE) is crucial for information security of Internet-of-Things
(IoT), and message clustering determines the effectiveness of PRE. However, the quality of …
(IoT), and message clustering determines the effectiveness of PRE. However, the quality of …
A cascade forest approach to application classification of mobile traces
Y Liu, S Zhang, B Ding, X Li… - 2018 IEEE Wireless …, 2018 - ieeexplore.ieee.org
With the rapid development of mobile networks, mobile traffic classification, a mapping of
mobile traffic to mobile applications, becomes more and more important for variant …
mobile traffic to mobile applications, becomes more and more important for variant …
P-gram: positional N-gram for the clustering of machine-generated messages
An IT system generates messages for other systems or users to consume, through direct
interaction or as system logs. Automatically identifying the types of these machine-generated …
interaction or as system logs. Automatically identifying the types of these machine-generated …
Extracting Length Field of Unknown Binary Network Protocol from Static Trace
X Sun, Z Wu, J Lin, P Fu, J Cui… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
Network protocol specification is essential in analyzing and evaluating network functionality,
performance, and security. However, increasing private protocols become a hindrance to …
performance, and security. However, increasing private protocols become a hindrance to …
[PDF][PDF] P-gram: Positional N-gram for the Clustering of Machine-Generated Messages
CL SCHNEIDER, Z FARAHMANDPOUR - academia.edu
An IT system generates messages for other systems or users to consume, through direct
interaction or as system logs. Being able to automatically identify the types of these machine …
interaction or as system logs. Being able to automatically identify the types of these machine …