• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xiao Mingming, Yu Shunzheng. Protocol Reverse Engineering Using Grammatical Inference[J]. Journal of Computer Research and Development, 2013, 50(10): 2044-2058.
Citation: Xiao Mingming, Yu Shunzheng. Protocol Reverse Engineering Using Grammatical Inference[J]. Journal of Computer Research and Development, 2013, 50(10): 2044-2058.

Protocol Reverse Engineering Using Grammatical Inference

More Information
  • Published Date: October 14, 2013
  • To deeply understand procedures of various network applications, and to automatically classify, recognize, trace and control them, protocol state machine that represents the application sessions have to be obtained in advance. A novel approach is presented to reversely infer protocol state machine from collected application layer data. Protocol state machine is derived with a method of error-correcting grammatical inference based on the state sequences that appear in the application sessions. To richly mine and bring into play the performance of error-collecting, a criterion of best-matching path is presented to solve the difficulty of path selection during the error-correcting process. A method with regard to abnormal indegree discrimination and pruning on the basis of statistical probability is proposed. Moreover, negative example sets with similar tokens are adopted to reinforce the error-collecting performance. In order to solve the state expansion during the reconstruction of the state machine, a simplifying measure to obtain a compact protocol state machine that expresses the internal operating mechanism of the protocol accurately is used based on state merging with removal of the identical token and model reduction with a similar behavioral semantic. The experiments conducted in a real network, containing a number of real applications with several application layer protocols, validate this method.
  • Related Articles

    [1]Xia Sibo, Ma Minghua, Jin Pengxiang, Cui Liyue, Zhang Shenglin, Jin Wa, Sun Yongqian, Pei Dan. Response Time Anomaly Diagnosis for Search Service[J]. Journal of Computer Research and Development, 2024, 61(6): 1573-1584. DOI: 10.7544/issn1000-1239.202330054
    [2]Ma Jun, Guo Yuanbo, Ma Jianfeng, Zhang Qi. A Time-Bound Hierarchical Access Control Scheme for Ubiquitous Sensing Network[J]. Journal of Computer Research and Development, 2017, 54(2): 328-337. DOI: 10.7544/issn1000-1239.2017.20150925
    [3]Jiang Junqiang, Lin Yaping, Xie Guoqi, Zhang Shiwen. Energy Optimization Heuristic for Deadline-Constrained Workflows in Heterogeneous Distributed Systems[J]. Journal of Computer Research and Development, 2016, 53(7): 1503-1516. DOI: 10.7544/issn1000-1239.2016.20160137
    [4]Wu Libing, Dang Ping, Nie Lei, He Yanxiang, Li Fei. A Fragmentable Admission Control Algorithm for Resource Reservation[J]. Journal of Computer Research and Development, 2014, 51(6): 1199-1205.
    [5]Zhou Hang, Huang Zhiqiu, Zhu Yi, Xia Liang, Liu Linyuan. Real-Time Systems Contact Checking and Resolution Based on Time Petri Net[J]. Journal of Computer Research and Development, 2012, 49(2): 413-420.
    [6]Zhou Hang, Huang Zhiqiu, Hu Jun, Zhu Yi. Real-Time System Resource Conflict Checking Based on Time Petri Nets[J]. Journal of Computer Research and Development, 2009, 46(9): 1578-1585.
    [7]Jiang Ying, Meng Dan. Enforcing Admission Control Using Admission-Time-Ratio and PI Controller[J]. Journal of Computer Research and Development, 2007, 44(1): 65-70.
    [8]Li Zhong, Wang Gang, and Liu Jing. A Statistical Admission Control Algorithm for Storage Systems with Mixed Multimedia Workloads[J]. Journal of Computer Research and Development, 2006, 43(3): 563-570.
    [9]Li Zhendong and Xie Li. Research on Ensuring QoS and Its Admission Control in Web Servers[J]. Journal of Computer Research and Development, 2005, 42(4): 662-668.
    [10]Xiao Hui and Hi Yunfa. Data Mining Based on Segmented Time Warping Distance in Time Series Database[J]. Journal of Computer Research and Development, 2005, 42(1): 72-78.

Catalog

    Article views (1065) PDF downloads (929) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return