Skip to main content

Unknown Bit Stream Protocol Message Discovery with Zero Knowledge

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9532))

Abstract

Unknown protocol discovery has a great significance for the network management. However, discovering the unknown bit stream protocol with zero knowledge is very difficult. This paper proposes an unsupervised method which can automatically extract protocol features and discover protocols with zero knowledge. The method discovers protocols by frequent sequences and positions based on clustering and detects address fields based on similarity of the unit set in different positions. The experimental results show that the method accurately discovers unknown bit stream protocols with high precision and recall using the least number of features for the given target protocol messages such as ICMP and ARP. The detected address fields are also highly accurate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. I. netflow statistics. http://netflow.internet2.edu

  2. Caballero, J., et al.: Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering. In: ACM CCS (2009)

    Google Scholar 

  3. Merwe, J.V.D., Caceres, R., Chu, Y.H., et al.: mmdump: a tool for monitoring internet multimedia traffic. ACM SIGCOMM Comput. Commun. Rev. 30(5), 48–59 (2005)

    Article  Google Scholar 

  4. Long, W., Xin, Y., Yang Y.: An application-level signatures extracting algorithm based on offset constraint. In: International Symposium on Intelligent Information Technology Application Workshops: IITAW 2008. IEEE (2008)

    Google Scholar 

  5. Wang, Y., Zhang, N., Wu, Y., Su, B.: Protocol specification inference based on keywords identification. In: Motoda, H., Wu, Z., Cao, L., Zaiane, O., Yao, M., Wang, W. (eds.) ADMA 2013, Part II. LNCS, vol. 8347, pp. 443–454. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  6. Jamdagni, A., Tan, Z., He, X., Nanda, P., Liu, R.P.: RePIDS: a multitier real-time payload-based intrusion detection system. Comput. Netw. 57(3), 811–824 (2013)

    Article  Google Scholar 

  7. Wang, Y., Zhang, Z., Yao, D.D., Qu, B., Guo, L.: Inferring protocol state machine from network traces: a probabilistic approach. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 1–18. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  8. Zhang, Z., Zhang, Z., Lee, P.P.C., et al.: Toward unsupervised protocol feature word extraction. IEEE J. Sel. Areas Commun. 32(10), 1894–1906 (2014)

    Article  Google Scholar 

  9. Cai, X., Zhang, R., Wang, B.: Machine learning and keyword-matching integrated protocol identification. In: 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT 2010). IEEE (2010)

    Google Scholar 

  10. IANA. www.iana.org/assignments/portnumbers

  11. Cui, W., Kannan, J., Wang, H.J.: Discoverer: automatic protocol reverse engineering from network traces. In: SS 2007: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (2007)

    Google Scholar 

  12. Macqueen, J., et al.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability (1967)

    Google Scholar 

Download references

Acknowledgment

This work is supported by National Natural Science Foundation of China (Grant No. U1230106; 61472064), Science and Technology Development Foundation of Chinese Academy of Engineering Physics (2012A0403021), Technology projects in Sichuan Province (2014GZ0109, 2015KZ002, 2015JY0178).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Junjiao Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zhang, F., Zhang, J., Zhou, H. (2015). Unknown Bit Stream Protocol Message Discovery with Zero Knowledge. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9532. Springer, Cham. https://doi.org/10.1007/978-3-319-27161-3_73

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27161-3_73

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27160-6

  • Online ISBN: 978-3-319-27161-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics