2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC) 2015
DOI: 10.1109/3pgcic.2015.68
|View full text |Cite
|
Sign up to set email alerts
|

Analyze Network Protocol's Hidden Behavior

Abstract: Unknown protocol's hidden behavior is becoming a new challenge in network security. This paper takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the virtual platform HiddenDisc prototype system developed by ourselves, record the protocol's public behavior, then based on our proposed Hidden Be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…e three basic elements of network protocols are semantics, syntax, and timing. e inference of the protocol message format and the determination of its field contents belong to the protocol syntax analysis [20]. e analysis and extraction of protocol syntax is the basis of protocol analysis and identification.…”
Section: Introductionmentioning
confidence: 99%
“…e three basic elements of network protocols are semantics, syntax, and timing. e inference of the protocol message format and the determination of its field contents belong to the protocol syntax analysis [20]. e analysis and extraction of protocol syntax is the basis of protocol analysis and identification.…”
Section: Introductionmentioning
confidence: 99%