Traffic to protocol reverse engineering

Trifilo, Antonio; Burschka, Stefan; Biersack, Ernst W
CISDA 2009, 2nd IEEE Symposium on Computational Intelligence for Security and Defence Applications, July 8-10, 2009, Ottawa, Canada

Network Protocol Reverse Engineering (NPRE) has played an increasing role in honeypot operations. It allows to automatically generate Statemodels and scripts being able to act as realistic counterpart for capturing unknown malware. This work proposes a novel approach in the field of NPRE. By passively listening to network traces, our system automatically derives the protocol state machines of the peers involved allowing the analyst to understand its intrinsic logic. We present a new methodology to extract the relevant fields from arbitrary binary protocols to construct a statemodel. We prove our methodology by deriving the statemachine of documented protocols ARP, DHCP and TCP. We then apply it to Kademlia, the results show the usefulness to support binary reverse engineering processes and detect a new undocumented feature.


DOI
Type:
Conférence
City:
Ottawa
Date:
2009-07-08
Department:
Sécurité numérique
Eurecom Ref:
2850
Copyright:
© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

PERMALINK : https://www.eurecom.fr/publication/2850