Computer and Modernization ›› 2023, Vol. 0 ›› Issue (05): 58-67.

Previous Articles     Next Articles

Overview of State Machine Inference Technology for Unknown Protocols

  

  1. (1.School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210023, China;
    2.Institute of Network Security and Trusted Computing, Nanjing University of Posts and Telecommunications, Nanjing 210023, China)
  • Online:2023-06-06 Published:2023-06-06

Abstract: Protocol reverse engineering (PRE) describes the behavioral logic of the protocol, which is generally divided into 2 steps: protocol format extraction and state machine construction. These two steps are both interrelated and independent. PRE has important significance in the field of network security. In this paper, we have comprehensively sort out the relevant reference of protocol state machine inference. The research status and development trend of protocol state machine reasoning are summarized and analyzed. Firstly, we introduce the formal definition and basic principles of PRE and discuss the specific requirements of the main fields. Secondly, we analyze the state machine inference methods and divide them into three patterns: clustering method, state-related method, and polling state entity. Then we compare the inverse ability and time efficiency of the algorithms from different perspectives. Finally, the development trend of protocol state machine reasoning is prospected.

Key words: protocol state machine inference, protocol reverse engineering, protocol format extraction, finite automata