题名 | Sub-messages extraction for industrial control protocol reverse engineering |
作者 | |
通讯作者 | Ding,Yulong |
发表日期 | 2022-10-01
|
DOI | |
发表期刊 | |
ISSN | 0140-3664
|
EISSN | 1873-703X
|
卷号 | 194页码:1-14 |
摘要 | The Industrial Internet of Things (IIoT) connects various industrial devices and processes for smart manufacturing purposes. The industrial devices and processes may employ standard or private communication protocols. Protocol Reverse Engineering (PRE) can infer the format of the unknown protocol by analyzing traffic traces. Existing work in the field mainly focuses on Internet protocol only, handling text messages. PRE for industrial control protocols is difficult and particularly designed for IIoT for real-time interconnection among industrial devices. Given the phenomenon that many consecutive sub-messages are often embedded in a lengthy message payload and have a similar format, a novel sub-messages extraction algorithm is proposed in this work by using template iteration as an intermediate step to form a full message format inference framework. An improved evaluation criterion is also proposed to evaluate the sub-messages extraction results. We carry out our algorithm on three standard industrial control protocols and two unknown protocols. Experiments show that adding our sub-messages extraction in PRE for IIoT can greatly improve the accuracy of the overall protocol format inference compared with the existing work. |
关键词 | |
相关链接 | [Scopus记录] |
收录类别 | |
语种 | 英语
|
学校署名 | 第一
; 通讯
|
资助项目 | Department of Education of Guangdong Province[2019KZDZX1018];Science and Technology Planning Project of Guangdong Province[2021A0505030001];National Natural Science Foundation of China[61873119];National Natural Science Foundation of China[92067109];Shenzhen Science and Technology Innovation Program[ZDSYS20210623092007023];
|
EI入藏号 | 20223112456635
|
EI主题词 | Extraction
; Inference engines
; Internet protocols
; Iterative methods
; Reverse engineering
|
EI分类号 | Data Communication, Equipment and Techniques:722.3
; Computer Software, Data Handling and Applications:723
; Expert Systems:723.4.1
; Chemical Operations:802.3
; Numerical Methods:921.6
|
ESI学科分类 | COMPUTER SCIENCE
|
Scopus记录号 | 2-s2.0-85134887253
|
来源库 | Scopus
|
引用统计 |
被引频次[WOS]:2
|
成果类型 | 期刊论文 |
条目标识符 | http://sustech.caswiz.com/handle/2SGJ60CL/365032 |
专题 | 工学院_计算机科学与工程系 |
作者单位 | 1.Shenzhen Key Laboratory of Safety and Security for Next Generation of Industrial Internet,Southern University of Science and Technology,Shenzhen,China 2.Department of Computer Science and Engineering,Southern University of Science and Technology,Shenzhen,China 3.Department of Computer Science,University of Reading,Reading,United Kingdom |
第一作者单位 | 南方科技大学; 计算机科学与工程系 |
通讯作者单位 | 南方科技大学; 计算机科学与工程系 |
第一作者的第一单位 | 南方科技大学 |
推荐引用方式 GB/T 7714 |
Liu,Yuhuan,Zhang,Fengyun,Ding,Yulong,et al. Sub-messages extraction for industrial control protocol reverse engineering[J]. COMPUTER COMMUNICATIONS,2022,194:1-14.
|
APA |
Liu,Yuhuan,Zhang,Fengyun,Ding,Yulong,Jiang,Jie,&Yang,Shuang Hua.(2022).Sub-messages extraction for industrial control protocol reverse engineering.COMPUTER COMMUNICATIONS,194,1-14.
|
MLA |
Liu,Yuhuan,et al."Sub-messages extraction for industrial control protocol reverse engineering".COMPUTER COMMUNICATIONS 194(2022):1-14.
|
条目包含的文件 | 条目无相关文件。 |
|
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论