A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View

A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented pr...

Full description

Bibliographic Details
Main Authors: Baraka D. Sija, Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, Myung-Sup Kim
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2018/8370341
id doaj-24b8aa981ba34870a417ec59ac4bef43
record_format Article
spelling doaj-24b8aa981ba34870a417ec59ac4bef432020-11-24T22:20:51ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/83703418370341A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs ViewBaraka D. Sija0Young-Hoon Goo1Kyu-Seok Shim2Huru Hasanova3Myung-Sup Kim4Department of Computer and Information Science, Korea University, Seoul, Republic of KoreaDepartment of Computer and Information Science, Korea University, Seoul, Republic of KoreaDepartment of Computer and Information Science, Korea University, Seoul, Republic of KoreaDepartment of Computer and Information Science, Korea University, Seoul, Republic of KoreaDepartment of Computer and Information Science, Korea University, Seoul, Republic of KoreaA network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model.http://dx.doi.org/10.1155/2018/8370341
collection DOAJ
language English
format Article
sources DOAJ
author Baraka D. Sija
Young-Hoon Goo
Kyu-Seok Shim
Huru Hasanova
Myung-Sup Kim
spellingShingle Baraka D. Sija
Young-Hoon Goo
Kyu-Seok Shim
Huru Hasanova
Myung-Sup Kim
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
Security and Communication Networks
author_facet Baraka D. Sija
Young-Hoon Goo
Kyu-Seok Shim
Huru Hasanova
Myung-Sup Kim
author_sort Baraka D. Sija
title A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
title_short A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
title_full A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
title_fullStr A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
title_full_unstemmed A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
title_sort survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2018-01-01
description A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model.
url http://dx.doi.org/10.1155/2018/8370341
work_keys_str_mv AT barakadsija asurveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview
AT younghoongoo asurveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview
AT kyuseokshim asurveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview
AT huruhasanova asurveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview
AT myungsupkim asurveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview
AT barakadsija surveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview
AT younghoongoo surveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview
AT kyuseokshim surveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview
AT huruhasanova surveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview
AT myungsupkim surveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview
_version_ 1725773539894624256