计算机与现代化 ›› 2023, Vol. 0 ›› Issue (05): 58-67.

• 信息安全 • 上一篇    下一篇

未知协议状态机推断技术研究综述

  

  1. (1.南京邮电大学计算机学院,江苏 南京210023 南京邮电大学; 2. 南京邮电大学网络安全与可信计算研究所,江苏 南京 210023)
  • 出版日期:2023-06-06 发布日期:2023-06-06
  • 作者简介:盛嘉杰(1996—),男,江苏南通人,硕士研究生,研究方向:物联网安全与信息安全, E-mail: sjj754451890@126.com;牛胜杰(1997—),男,山东菏泽人,硕士研究生,研究方向:物联网安全,E-mail: 1220045122@njupt.edu.cn; 陈阳(1997—),男,江苏徐州人,硕士,研究方向:物联网安全,E-mail: yyangc@outlook.cn; 方伟青(1996—),男,浙江龙泉人,硕士,研究方向:网络安全, E-mail: aili8@foxmail.com; 张玉杰(1989—),男,讲师, 博士,研究方向:计算机通信网络,无线传感器网络,信息安全, E-mail: zhangyujie@njupt.edu.cn; 通信作者:李鹏(1979—),男,福建长汀人,教授,博士生导师,研究方向:网络安全,云计算技术,E-mail: lipeng@njupt.edu.cn; 胡素君(1973—),女,河南开封人,副教授,研究方向:计算机网络,E-mail: husj@njupt.edu.cn。
  • 基金资助:
    国家自然科学基金资助项目(61872196,61872194,61902196,62102194,62102196); 江苏省六大人才高峰高层次人才项目(RJFW-111); 江苏省研究生科研创新计划(KYCX21_0787)

Overview of State Machine Inference Technology for Unknown Protocols

  1. (1.School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China;
    2.Institute of Network Security and Trusted Computing, Nanjing University of Posts and Telecommunications, Nanjing 210023, China)
  • Online:2023-06-06 Published:2023-06-06

摘要: 协议逆向工程(PRE)描述了协议的行为逻辑,一般分为协议格式提取和状态机构造2个步骤。这2个步骤既相互关联又相互独立,在网络安全领域具有重要意义。本文全面梳理PRE协议状态机推理的相关文献,总结分析协议状态机推理的研究现状和发展趋势。首先,本文介绍PRE的形式化定义和基本原则,并讨论主要领域的具体要求。其次,分析状态机推理方法,并将其分为3种模式:聚类方法、状态相关方法和轮询状态实体方法,然后从不同的角度比较算法的逆向能力和时间效率。最后展望协议状态机推理的发展趋势。

关键词: 协议状态机推断, 协议逆向工程, 协议格式提取, 有限自动机

Abstract: Protocol reverse engineering (PRE) describes the behavioral logic of the protocol, which is generally divided into 2 steps: protocol format extraction and state machine construction. These two steps are both interrelated and independent. PRE has important significance in the field of network security. In this paper, we have comprehensively sort out the relevant reference of protocol state machine inference. The research status and development trend of protocol state machine reasoning are summarized and analyzed. Firstly, we introduce the formal definition and basic principles of PRE and discuss the specific requirements of the main fields. Secondly, we analyze the state machine inference methods and divide them into three patterns: clustering method, state-related method, and polling state entity. Then we compare the inverse ability and time efficiency of the algorithms from different perspectives. Finally, the development trend of protocol state machine reasoning is prospected.

Key words: protocol state machine inference, protocol reverse engineering, protocol format extraction, finite automata