首页> 外文会议>IEEE International Conference on Trust, Security and Privacy in Computing and Communications >Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment
【24h】

Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment

机译:基于无线环境中关联规则的协议格式化逆向工程

获取原文

摘要

With the wide deployment of wireless networks, attackers may exploit Wi-Fi network vulnerabilities to transfer data secretly, or covert communication channels to spread malicious codes. The protocol formats reverse engineering technique can be used to detect such attacks, however, previous works are focused on the application layer protocol analysis, and can hardly work under the scenarios that the captured data is only in binary format due to the lack of semantics. In this paper, we propose a novel protocol formats reverse engineering framework, which utilizes the association rules of feature sequences to identify unknown protocols from captured binary data. We first convert the captured binary data into a bit stream, and segment it into frames. The improved AC algorithm is adopted to analyze the binary sequences. After which, we extract the feature sequences and analyze their association rules to detect potential unknown protocols. The experimental results show that our framework can identify 100% ARP packets and 98% ICMP packets from captured binary data.
机译:随着无线网络的广泛部署,攻击者可以利用Wi-Fi网络漏洞来秘密传输数据,或者覆盖通信渠道以传播恶意代码。协议格式逆向工程技术可用于检测此类攻击,然而,以前的作品专注于应用层协议分析,并且在捕获数据由于缺乏语义而仅以二进制格式仅以二进制格式而实际上工作。在本文中,我们提出了一种新颖的协议格式逆向工程框架,其利用特征序列的关联规则来识别来自捕获二进制数据的未知协议。我们首先将捕获的二进制数据转换为位流,并将其分段为帧。采用改进的AC算法来分析二进制序列。之后,我们提取特征序列并分析其关联规则以检测潜在的未知协议。实验结果表明,我们的框架可以识别捕获二进制数据的100%ARP数据包和98%的ICMP数据包。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号