Clustering perception mining of network protocol’s stealth attack behavior

Deep stealth attack behavior in the network protocol becomes a new challenge to network security.In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior,especially the stealth attack behavior mining,a novel instruction clustering perception mining al...

Full description

Saved in:
Bibliographic Details
Main Authors: Yan-jing HU, Qing-qi PEI
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017123/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539523033432064
author Yan-jing HU
Qing-qi PEI
author_facet Yan-jing HU
Qing-qi PEI
author_sort Yan-jing HU
collection DOAJ
description Deep stealth attack behavior in the network protocol becomes a new challenge to network security.In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior,especially the stealth attack behavior mining,a novel instruction clustering perception mining algorithm was proposed.By extracting the protocol's behavior instruction sequences,and clustering analysis of all the behavior instruction sequences using the instruction clustering algorithm,the stealth attack behavior instruction sequences can be mined quickly and accurately from a large number of unknown protocol programs according to the calculation results of the behavior distance.Combining dynamic taint analysis with instruction clustering analysis,1 297 protocol samples were analyzed in the virtual analysis platform hidden disc which was developed independently,and 193 stealth attack behaviors were successfully mined,the results of automatic analysis and manual analysis were completely consistent.Experimental results show that,the solution is ideal for perception mining the protocol's stealth attack behavior in terms of efficiency and accuracy.
format Article
id doaj-art-8f5d5dc404044fd48d70c8d4bf1466bd
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-06-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-8f5d5dc404044fd48d70c8d4bf1466bd2025-01-14T07:12:08ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-06-0138394859709487Clustering perception mining of network protocol’s stealth attack behaviorYan-jing HUQing-qi PEIDeep stealth attack behavior in the network protocol becomes a new challenge to network security.In view of the shortcomings of the existing protocol reverse methods in the analysis of protocol behavior,especially the stealth attack behavior mining,a novel instruction clustering perception mining algorithm was proposed.By extracting the protocol's behavior instruction sequences,and clustering analysis of all the behavior instruction sequences using the instruction clustering algorithm,the stealth attack behavior instruction sequences can be mined quickly and accurately from a large number of unknown protocol programs according to the calculation results of the behavior distance.Combining dynamic taint analysis with instruction clustering analysis,1 297 protocol samples were analyzed in the virtual analysis platform hidden disc which was developed independently,and 193 stealth attack behaviors were successfully mined,the results of automatic analysis and manual analysis were completely consistent.Experimental results show that,the solution is ideal for perception mining the protocol's stealth attack behavior in terms of efficiency and accuracy.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017123/protocol reverse analysisstealth attack behaviorinstruction clustering
spellingShingle Yan-jing HU
Qing-qi PEI
Clustering perception mining of network protocol’s stealth attack behavior
Tongxin xuebao
protocol reverse analysis
stealth attack behavior
instruction clustering
title Clustering perception mining of network protocol’s stealth attack behavior
title_full Clustering perception mining of network protocol’s stealth attack behavior
title_fullStr Clustering perception mining of network protocol’s stealth attack behavior
title_full_unstemmed Clustering perception mining of network protocol’s stealth attack behavior
title_short Clustering perception mining of network protocol’s stealth attack behavior
title_sort clustering perception mining of network protocol s stealth attack behavior
topic protocol reverse analysis
stealth attack behavior
instruction clustering
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017123/
work_keys_str_mv AT yanjinghu clusteringperceptionminingofnetworkprotocolsstealthattackbehavior
AT qingqipei clusteringperceptionminingofnetworkprotocolsstealthattackbehavior