Dynamic Combined with Static Analysis for Mining Network Protocol's Hidden Behavior
Unknown protocol's hidden behavior is becoming a new challenge in network security. This paper takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the virtual platform HiddenDisc prototype system developed by the authors, record the protocol's public behavior, then based on the authors' proposed Hidden Behavior Perception and Mining algorithm, static analyze the protocol's hidden behavior trigger conditions and hidden behavior instruction sequences. According to the hidden behavior trigger conditions, new protocol messages with the sensitive information are generated, and the hidden behaviors are executed by dynamic triggering. HiddenDisc prototype system can sense, trigger and analyze the protocol's hidden behaviors. According to the statistical analysis results, the authors propose the evaluation method of Protocol Execution Security. The experimental results show that the present method can accurately mining the protocol's hidden behaviors, and can evaluate unknown protocol's execution security.
Year of publication: |
2017
|
---|---|
Authors: | Hu, Yanjing ; Pei, Qingqi |
Published in: |
International Journal of Business Data Communications and Networking (IJBDCN). - IGI Global, ISSN 1548-064X, ZDB-ID 2400953-2. - Vol. 13.2017, 2 (01.07.), p. 1-14
|
Publisher: |
IGI Global |
Subject: | Protocol Message | Protocol Reverse Analysis | Protocol Software | Protocol’s Hidden Behavior |
Saved in:
Online Resource
Saved in favorites
Similar items by subject
-
Find similar items by using search terms and synonyms from our Thesaurus for Economics (STW).