Unlock instant, AI-driven research and patent intelligence for your innovation.

Protocol Reverse Engineering System and Its Working Method Based on Reinforcement Learning

A technology of reinforcement learning and protocol reverse engineering, applied in the field of protocol reverse engineering system based on reinforcement learning, it can solve the problems of few types of protocols, unclear protocol, incomplete protocol specifications, etc. Effect

Active Publication Date: 2022-03-18
SHANGHAI NETIS TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] 2) The invention can only find the positions of some fields with semantic features, and cannot obtain the complete protocol message format;
[0019] 1) It is only segmented, and complete information such as the encoding method of each field is not deduced;
[0020] 2) Does not support complex nested structures;
[0026] Existing technologies have defects such as requiring additional prior knowledge, supporting few types of protocols, not being able to recognize protocols with complex structures, and inferring protocol specifications that are incomplete and unclear.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protocol Reverse Engineering System and Its Working Method Based on Reinforcement Learning
  • Protocol Reverse Engineering System and Its Working Method Based on Reinforcement Learning
  • Protocol Reverse Engineering System and Its Working Method Based on Reinforcement Learning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0115] The implementation example of this method, the steps are as follows:

[0116] Step 1: Collect data sets, each data sample contains multiple messages, and each message contains known fields and unknown upper layer payloads to be analyzed.

[0117] By collecting network data packet files (pcap files) from the Internet, each data packet file is analyzed for a known lower layer protocol, and the analysis result is formed into a data sample.

[0118] Step 2 builds a reinforcement learning decoding model.

[0119] Such as figure 1 The illustrated reinforcement learning decoding model includes a decoding environment module and a decoding agent module.

[0120] The input of the decoding environment module is an action, and the output is a state and a reward. The inputs of the decoding agent module are states and rewards, and the outputs are actions.

[0121] The status includes the following information:

[0122] raw_data The original data sample to be analyzed.

[0123] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A protocol reverse engineering system based on reinforcement learning and its working method provided by the present invention include a decoding environment module and a decoding agent module; wherein the decoding environment module receives the state of the previous moment and the current action output by the decoding agent module, And input the new state to the decoding agent module. Compared with the prior art, the present invention has the following beneficial effects: 1) The protocol structure tree is used to represent the protocol structure. The method has strong expressive ability, rich semantics and supports complex structures. 2) An innovative protocol reverse engineering method based on deep reinforcement learning is proposed. After a large amount of data training, it has a wide range of applications and can reverse engineer data of various types of protocols. 3) When the trained decoding model performs protocol reverse, it does not need any prior knowledge or manual participation, and can fully automatically perform protocol reverse.

Description

technical field [0001] The invention relates to protocol reverse engineering, in particular to a protocol reverse engineering system and working method based on reinforcement learning. Background technique [0002] A protocol is a series of rules, standards, and conventions established for network data exchange, and is the core of computer networks and data communications. [0003] For an open protocol, such as Hyper Text Transfer Protocol (HTTP, Hyper Text Transfer Protocol), its detailed description information can be obtained from public documents (such as RFCs). [0004] But for private protocols, the protocol description information is usually not made public. [0005] Protocol reverse engineering refers to the process of obtaining application-level description information of unknown protocols. [0006] The traditional method of protocol reverse engineering is manual, which is very labor-intensive and error-prone. A typical example is the SAMBA project. The SAMBA pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L67/01H04L69/06G06N3/08G06N3/04
CPCH04L69/03H04L69/06G06N3/08G06N3/045
Inventor 陶飞蔡晓华杨光辉
Owner SHANGHAI NETIS TECH