A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented pr...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2018/8370341 |
id |
doaj-24b8aa981ba34870a417ec59ac4bef43 |
---|---|
record_format |
Article |
spelling |
doaj-24b8aa981ba34870a417ec59ac4bef432020-11-24T22:20:51ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/83703418370341A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs ViewBaraka D. Sija0Young-Hoon Goo1Kyu-Seok Shim2Huru Hasanova3Myung-Sup Kim4Department of Computer and Information Science, Korea University, Seoul, Republic of KoreaDepartment of Computer and Information Science, Korea University, Seoul, Republic of KoreaDepartment of Computer and Information Science, Korea University, Seoul, Republic of KoreaDepartment of Computer and Information Science, Korea University, Seoul, Republic of KoreaDepartment of Computer and Information Science, Korea University, Seoul, Republic of KoreaA network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model.http://dx.doi.org/10.1155/2018/8370341 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Baraka D. Sija Young-Hoon Goo Kyu-Seok Shim Huru Hasanova Myung-Sup Kim |
spellingShingle |
Baraka D. Sija Young-Hoon Goo Kyu-Seok Shim Huru Hasanova Myung-Sup Kim A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View Security and Communication Networks |
author_facet |
Baraka D. Sija Young-Hoon Goo Kyu-Seok Shim Huru Hasanova Myung-Sup Kim |
author_sort |
Baraka D. Sija |
title |
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View |
title_short |
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View |
title_full |
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View |
title_fullStr |
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View |
title_full_unstemmed |
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View |
title_sort |
survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2018-01-01 |
description |
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model. |
url |
http://dx.doi.org/10.1155/2018/8370341 |
work_keys_str_mv |
AT barakadsija asurveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview AT younghoongoo asurveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview AT kyuseokshim asurveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview AT huruhasanova asurveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview AT myungsupkim asurveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview AT barakadsija surveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview AT younghoongoo surveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview AT kyuseokshim surveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview AT huruhasanova surveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview AT myungsupkim surveyofautomaticprotocolreverseengineeringapproachesmethodsandtoolsontheinputsandoutputsview |
_version_ |
1725773539894624256 |