Skip to main content
Erschienen in: The Journal of Supercomputing 7/2020

01.01.2020

Deep neural network-based automatic unknown protocol classification system using histogram feature

verfasst von: YoungGiu Jung, Chang-Min Jeong

Erschienen in: The Journal of Supercomputing | Ausgabe 7/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The protocol reverse engineering technique can be used to extract the specification of an unknown protocol. However, there is no standardized method, and in most cases, the extracting process is executed manually or semiautomatically. Since only frequently seen values are extracted as fields from the messages of a protocol, it is difficult to understand the complete specification of the protocol. Therefore, if the information about the structure of an unknown protocol could be acquired in advance, it would be easy to conduct reverse engineering. As such, one of the most important techniques for classifying unknown protocols is a feature extraction algorithm. In this paper, we propose a new feature extraction algorithm based on average histogram for classification of an unknown protocol and design unknown protocol classifier using deep belief networks, one of deep learning algorithms. In order to verify the performance of the proposed system, we performed the training using eight open protocols to evaluate the performance using unknown data. Experimental results show that the proposed technique gives significantly more reliable results of about 99% classification performance, regardless of the strength of the modification of the protocol.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cui W, Kannan J, Wang HJ (2007) Discoverer: automatic protocol reverse engineering from network traces, pp 199–212 Cui W, Kannan J, Wang HJ (2007) Discoverer: automatic protocol reverse engineering from network traces, pp 199–212
2.
Zurück zum Zitat Wondracek G, Comparetti PM, Kruegel C, Kirda E (2008) Automatic network protocol analysis. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 08) Wondracek G, Comparetti PM, Kruegel C, Kirda E (2008) Automatic network protocol analysis. In: Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS 08)
3.
Zurück zum Zitat Cui W, Peinado M, Chen K, Wang HJ, Irun-Briz L (2008) Tupni: automatic reverse engineering of input formats. In: Proceedings of the 15th ACM Conference on Computer and communications security, pp 391–402 Cui W, Peinado M, Chen K, Wang HJ, Irun-Briz L (2008) Tupni: automatic reverse engineering of input formats. In: Proceedings of the 15th ACM Conference on Computer and communications security, pp 391–402
4.
Zurück zum Zitat Zhang J, Chen X, Xiang Y, Zhou W, Wu J (2015) Robust network traffic classification. IEEE/ACM Trans Netw 23(4):1257–1270CrossRef Zhang J, Chen X, Xiang Y, Zhou W, Wu J (2015) Robust network traffic classification. IEEE/ACM Trans Netw 23(4):1257–1270CrossRef
5.
Zurück zum Zitat Lin R, Li O, Li Q, Liu Y (2015) Unknown network protocol classification method based on semi-supervised learning. In: IEEE International Conference on Computer and Communications (ICCC), pp 300–308 Lin R, Li O, Li Q, Liu Y (2015) Unknown network protocol classification method based on semi-supervised learning. In: IEEE International Conference on Computer and Communications (ICCC), pp 300–308
6.
Zurück zum Zitat Yu H, Zhao Y, Xiong G, Guo L, Li Z, Wang Y (2014) POSTER: mining elephant applications in unknown traffic by service clustering. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 1532–1534 Yu H, Zhao Y, Xiong G, Guo L, Li Z, Wang Y (2014) POSTER: mining elephant applications in unknown traffic by service clustering. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. ACM, pp 1532–1534
7.
Zurück zum Zitat McGregor A, Hall M, Lorier P, Brunskill J (2004) Flow clustering using machine learning techniques. In: Proceedings of Passive and Active Measurement Workshop (PAM2004), Antibes Juan-les-Pins, France McGregor A, Hall M, Lorier P, Brunskill J (2004) Flow clustering using machine learning techniques. In: Proceedings of Passive and Active Measurement Workshop (PAM2004), Antibes Juan-les-Pins, France
9.
Zurück zum Zitat Lee G-H (2019) Radar jamming technique prediction using deep learning. Thesis, Chungnam National University Lee G-H (2019) Radar jamming technique prediction using deep learning. Thesis, Chungnam National University
10.
Zurück zum Zitat He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: surpassing human-level performance on ImageNet classification. In: International Conference on Computer Vision (ICCV) He K, Zhang X, Ren S, Sun J (2015) Delving deep into rectifiers: surpassing human-level performance on ImageNet classification. In: International Conference on Computer Vision (ICCV)
Metadaten
Titel
Deep neural network-based automatic unknown protocol classification system using histogram feature
verfasst von
YoungGiu Jung
Chang-Min Jeong
Publikationsdatum
01.01.2020
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 7/2020
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-019-03108-w

Weitere Artikel der Ausgabe 7/2020

The Journal of Supercomputing 7/2020 Zur Ausgabe