• DocumentCode
    3757052
  • Title

    Analyze Network Protocol´s Hidden Behavior

  • Author

    Yanjing Hu;Liaojun Pang;Qingqi Pei;Xu An Wang

  • Author_Institution
    State Key Lab. of Integrated Services Networks, Xidian Univ., Xi´an, China
  • fYear
    2015
  • Firstpage
    403
  • Lastpage
    406
  • Abstract
    Unknown protocol´s hidden behavior is becoming a new challenge in network security. This paper takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the virtual platform HiddenDisc prototype system developed by ourselves, record the protocol´s public behavior, then based on our proposed Hidden Behavior Perception and Mining algorithm, static analyze the protocol´s hidden behavior trigger conditions and hidden behavior instruction sequences. According to the hidden behavior trigger conditions, new protocol messages with the sensitive information are generated, and the hidden behaviors are executed by dynamic triggering. HiddenDisc prototype system can sense, trigger and analysis the protocol´s hidden behaviors. According to the statistical analysis results, we propose the evaluation method of Protocol Execution Security. The experimental results show that the present method can accurately mining the protocol´s hidden behaviors, and can evaluate unknown protocol´s execution security.
  • Keywords
    "Protocols","Security","Monitoring","Heuristic algorithms","Performance analysis","Servers","Algorithm design and analysis"
  • Publisher
    ieee
  • Conference_Titel
    P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2015 10th International Conference on
  • Type

    conf

  • DOI
    10.1109/3PGCIC.2015.68
  • Filename
    7424596