• DocumentCode
    652197
  • Title

    Protocol Formats Reverse Engineering Based on Association Rules in Wireless Environment

  • Author

    Yong Wang ; Nan Zhang ; Yan-mei Wu ; Bin-bin Su ; Yong-jian Liao

  • Author_Institution
    Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
  • fYear
    2013
  • fDate
    16-18 July 2013
  • Firstpage
    134
  • Lastpage
    141
  • Abstract
    With the wide deployment of wireless networks, attackers may exploit Wi-Fi network vulnerabilities to transfer data secretly, or covert communication channels to spread malicious codes. The protocol formats reverse engineering technique can be used to detect such attacks, however, previous works are focused on the application layer protocol analysis, and can hardly work under the scenarios that the captured data is only in binary format due to the lack of semantics. In this paper, we propose a novel protocol formats reverse engineering framework, which utilizes the association rules of feature sequences to identify unknown protocols from captured binary data. We first convert the captured binary data into a bit stream, and segment it into frames. The improved AC algorithm is adopted to analyze the binary sequences. After which, we extract the feature sequences and analyze their association rules to detect potential unknown protocols. The experimental results show that our framework can identify 100% ARP packets and 98% ICMP packets from captured binary data.
  • Keywords
    computer network security; protocols; radio networks; reverse engineering; wireless LAN; Wi-Fi network vulnerability; application layer protocol analysis; association rules; binary sequences; captured binary data; covert communication channels; feature sequences; improved AC algorithm; malicious codes; protocol format reverse engineering technique; wireless environment; wireless networks; Algorithm design and analysis; Approximation algorithms; Association rules; Inference algorithms; Protocols; Reverse engineering; Wireless networks; association rules; binary analysis; protocol formats; wireless network;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
  • Conference_Location
    Melbourne, VIC
  • Type

    conf

  • DOI
    10.1109/TrustCom.2013.21
  • Filename
    6680833