Abstract
Payloads of packets transmitted over network contain dynamic fields that represent many kinds of real world objects. In many different applications, there is a need to recognize and sometimes replace these fields. In this paper, we present a manually assisted solution for searching and annotating dynamic fields in message payloads, specifically focusing on web environment. Our tool provides a simple and intuitive graphical user interface for annotating dynamic fields.
The authors gratefully acknowledge the support of The Scientific Advisory Board for Defence (MATINE).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Almeshekah, M.H., Spafford, E.G.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 Workshop on New Security Paradigms Workshop, pp. 127–138. ACM (2014)
Cohen, F., Koike, D.: Misleading attackers with deception. In: Proceedings from the Fifth Annual IEEE Information Assurance Workshop, pp. 30–37. IEEE (2004)
Cui, W., Paxson, V., Weaver, N., Katz, R.H.: Protocol-independent adaptive replay of application dialog. In: Proceedings of the 13th Annual Network and Distributed System Security Symposium (2006)
Gnome Developer: GTK+ 3 Reference Manual. https://developer.gnome.org/gtk3/3.0/
Irving, R.W., Fraser, C.B.: Two algorithms for the longest common subsequence of three (or more) strings, pp. 214–229. Springer, Heidelberg (1992)
Moser, D.: Diffuse homepage. http://diffuse.sourceforge.net/
Nadeau, D., Turney, P.D., Matwin, S.: Unsupervised named-entity recognition: generating gazetteers and resolving ambiguity. In: Proceedings of the 19th International Conference on Advances in Artificial Intelligence: Canadian Society for Computational Studies of Intelligence, AI 2006, pp. 266–277. Springer-Verlag (2006)
Papalitsas, J., Rauti, S., Leppänen, V.: A comparison of record and play honeypot designs. In: Proceedings of the 18th International Conference on Computer Systems and Technologies, CompSysTech 2017, pp. 133–140. ACM, New York (2017)
Python Software Foundation: difflib
Sekine, S., Nobata, C.: Definition, dictionaries and tagger for extended named entity hierarchy. In: LREC, pp. 1977–1980 (2004)
Tammi, J., Rauti, S., Leppänen, V.: Practical Challenges in Building Fake Services with the Record and Play Approach (2017, accepted)
Wang, Q., Korkin, D., Shang, Y.: A fast multiple longest common subsequence (MLCS) algorithm. IEEE Trans. Knowl. Data Eng. 23(3), 321–334 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Papalitsas, J., Tammi, J., Rauti, S., Leppänen, V. (2018). Recognizing Dynamic Fields in Network Traffic with a Manually Assisted Solution. In: Rocha, Á., Adeli, H., Reis, L., Costanzo, S. (eds) Trends and Advances in Information Systems and Technologies. WorldCIST'18 2018. Advances in Intelligent Systems and Computing, vol 746. Springer, Cham. https://doi.org/10.1007/978-3-319-77712-2_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-77712-2_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-77711-5
Online ISBN: 978-3-319-77712-2
eBook Packages: EngineeringEngineering (R0)