Protocol Reverse Engineering (PRE) has become the foundation of numerous downstream security analyses, including vulnerability mining and intrusion detection. As the mainstream PRE technique, network trace-based PRE methods utilize various protocol features (e.g., specific features or universal features) to identify fields and their semantics. However, the inherent limitations of these features consequently constrain the performance of these PRE methods, compromising their generalizability or effectiveness. To address this, we propose an Extensible Protocol Reverse Engineering Framework Based on Multi-objective OPtimization (ExMOP) that flexibly incorporates multiple basic feature rules while synergistically integrating their complementary advantages to enhance protocol field segmentation performance. Each basic feature rule can be easily formalized as an optimization objective function, transforming the protocol field segmentation problem into a constrained multi-objective optimization model. We employ the Differential Evolution (DE) algorithm to solve this model, deriving the optimal field segmentation strategy. Ultimately, we conduct comprehensive experiments on publicly available datasets of multiple Internet protocols and industrial protocols. ExMOP demonstrates superior performance across all evaluation metrics (including 81 % precision, 81 % recall, 86 % accuracy, 80 % F1-score, 11 % FPR, and 60 % Perfection), significantly outperforming state-of-the-art methods, including NEMESYS (Usenix Security ’2018), AWRE (Usenix Security ’2019), NetPlier (NDSS ’2021), and BinaryInferno (NDSS ’2023). Furthermore, experiments affirm that expanding higher-efficiency feature rules can significantly enhance ExMOP’s performance in terms of accuracy, convergence, and stability.
扫码关注我们
求助内容:
应助结果提醒方式:
