Protocol reverse-engineering methods and tools: A survey

Y Huang, H Shu, F Kang, Y Guang - Computer Communications, 2022 - Elsevier
The widespread utilization of network protocols raises many security and privacy concerns.
To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse …

A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view

BD Sija, YH Goo, KS Shim… - Security and …, 2018 - Wiley Online Library
A network protocol defines rules that control communications between two or more
machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines …

Khaos: An adversarial neural network DGA with high anti-detection ability

X Yun, J Huang, Y Wang, T Zang… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
A botnet is a network of remote-controlled devices that are infected with malware controlled
by botmasters in order to launch cyber attacks. To evade detection, the botmaster frequently …

Detecting domain generation algorithms with convolutional neural language models

J Huang, P Wang, T Zang, Q Qiang… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
To evade detection, botnets apply DNS domain fluxing for Command and Control (C&C)
servers. In this way, each bot generates a large number of domain names with Domain …

CCGA: clustering and capturing group activities for DGA-based botnets detection

Z Liu, X Yun, Y Zhang, Y Wang - 2019 18th IEEE International …, 2019 - ieeexplore.ieee.org
Botnet is a part of the most destructive threats to network security and is often used in
malicious activities. DGA-based botnet, which uses Domain Generation Algorithm (DGA) to …

A type-aware approach to message clustering for protocol reverse engineering

X Luo, D Chen, Y Wang, P Xie - Sensors, 2019 - mdpi.com
Protocol Reverse Engineering (PRE) is crucial for information security of Internet-of-Things
(IoT), and message clustering determines the effectiveness of PRE. However, the quality of …

A cascade forest approach to application classification of mobile traces

Y Liu, S Zhang, B Ding, X Li… - 2018 IEEE Wireless …, 2018 - ieeexplore.ieee.org
With the rapid development of mobile networks, mobile traffic classification, a mapping of
mobile traffic to mobile applications, becomes more and more important for variant …

P-gram: positional N-gram for the clustering of machine-generated messages

J Jiang, S Versteeg, J Han, MA Hossain… - IEEE …, 2019 - ieeexplore.ieee.org
An IT system generates messages for other systems or users to consume, through direct
interaction or as system logs. Automatically identifying the types of these machine-generated …

Extracting Length Field of Unknown Binary Network Protocol from Static Trace

X Sun, Z Wu, J Lin, P Fu, J Cui… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
Network protocol specification is essential in analyzing and evaluating network functionality,
performance, and security. However, increasing private protocols become a hindrance to …

[PDF][PDF] P-gram: Positional N-gram for the Clustering of Machine-Generated Messages

CL SCHNEIDER, Z FARAHMANDPOUR - academia.edu
An IT system generates messages for other systems or users to consume, through direct
interaction or as system logs. Being able to automatically identify the types of these machine …