{"title":"Protocol Reverse Engineering by Analysis of the Probability Distribution of Messages","authors":"Wu Weisen, Gu Chunxiang","doi":"10.1109/icceic51584.2020.00022","DOIUrl":null,"url":null,"abstract":"The protocol reverse engineering is becoming more and more important because of the unknown protocols. This study proposes a protocol reverse method, based on the network traffic, which uses the probability distribution relationship between the fields to analyze the field boundaries. The experimental results show that the algorithm is better than Netzob in running results and time.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icceic51584.2020.00022","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The protocol reverse engineering is becoming more and more important because of the unknown protocols. This study proposes a protocol reverse method, based on the network traffic, which uses the probability distribution relationship between the fields to analyze the field boundaries. The experimental results show that the algorithm is better than Netzob in running results and time.