期刊文献+

一种基于域知识的协议状态机主动推断算法 被引量:4

Domain-specific Algorithm of Protocol State Machine Active Inference
下载PDF
导出
摘要 现有基于L*算法的协议状态机主动推断方法忽略了协议特有的域知识,将协议报文抽象为相互独立、无意义的符号,并完全随机地生成测试样本进行状态机等价判定,导致产生大量的无效询问和测试样本,在真实网络环境下推断效率较低。在L+M算法的基础上提出了一种基于域知识的协议状态机主动推断算法L+N,其改进主要体现在:依据会话样本集提取各报文之间的强顺序约束关系来过滤无效的输出询问,构建会话样本集对应的扩展前缀树接受器(Extended Prefix Tree Accepter,EPTA)对输出询问进行预响应,提出了一种基于正例样本变异的等价询问近似判定算法以提升寻找反例的效率。实验结果表明,L+N算法能够大幅提高推断效率,并且具有与L+M算法相同的推断准确度。 Existing protocol state machine inference approaches based on algorithm L^* are inefficient owing to ignorance of protocol-specific knowledge. As the protocol messages are abstracted as the independent and insignificant sym- bols, and test samples are completely generated randomly in equivalence query, invalid queries and test samples are inevitable. A protocol state machine active inference algorithm named LN^+ was proposed, which improves the algorithm LM^+ in three aspects. Firstly,LN^+ filters the invalid output query according to the constraint on strict order, which is extracted from conservation samples. Secondly, LN^+ constructs the extended prefix tree accepter(EPTA) corresponding to the sample set and answers the output query in advance. Thirdly, a new proposed strategy to find counterexamples more effectively is applied to judge the equivalence query based on positive sample mutation. Experimental results show that LN+ improves the inference efficiency greatly and achieves the same accuracy as algorithm LM^+.
出处 《计算机科学》 CSCD 北大核心 2015年第12期233-239,共7页 Computer Science
基金 国家自然科学基金项目(611032253) 江苏省自然科学基金项目(BK2011115)资助
关键词 L^*算法 协议状态机 主动推断 域知识 推断效率 Algorithm L^* , Protocol state machine, Active inference, Domain-specific knowledge, Inference efficiency
  • 相关文献

参考文献22

  • 1李伟明,张爱芳,刘建财,李之棠.网络协议的自动化模糊测试漏洞挖掘方法[J].计算机学报,2011,34(2):242-255. 被引量:66
  • 2侯莹,洪征,潘璠,吴礼发.基于模型的Fuzzing测试脚本自动化生成[J].计算机科学,2013,40(3):206-209. 被引量:7
  • 3应凌云,杨轶,冯登国,苏璞睿.恶意软件网络协议的语法和行为语义分析方法[J].软件学报,2011,22(7):1676-1689. 被引量:23
  • 4Tridgell. How Samba was written [EB/OL]. 2005-02-04/2014- 11-101. http://samba, org/ftp/tridge/misc/french cafe. txt.
  • 5Lang K J. Faster Algorithms for Finding Minimal Consistent DFAs[R]. NEC Research Institute, 1999.
  • 6Oncina J, Garcia P. Inferring regular languages in polynomial up- date time [J]- Pattern Recognition and Image Analysis, 1992,1 49-61.
  • 7Lang K J,Pearlmutter B A,Price R A. Results of the Abbadingo one DFA learning competition and a new evidence-driven state merging algorithm[M]//Grammatical Inference. Springer Berlin Heidelberg, 1998 : 1-12.
  • 8Gold E M. Language Identification in the Limit [J]. Information and Control, 1967,10 (5) : 447-474.
  • 9Dupont P, Lambeau B, Damas C, et al. The QSM algorithm and its application to software behavior model induction EJ]. Applied Artificial Intelligence, 2008,22 ( 1 ) : 77-115.
  • 10Angluin D. Learning regular sets from queries and counterexam- ples [J]. Information and computation, 1987,75(2): 87-106.

二级参考文献104

  • 1刘立芳,霍红卫,王宝树.PHGA-COFFEE:多序列比对问题的并行混合遗传算法求解[J].计算机学报,2006,29(5):727-733. 被引量:11
  • 2Cui Weidong, Paxson V, Weaver N C, et al. Protocol-inde- pendent adaptive replay of application dialog [ C ]//Proceed- ing of the 13th Annual Network and Distributed System Se- curity Symposium. San Diego, CA,2006.
  • 3Dreger H, Feldmann A, Mai M, et al. Dynamic application- layer protocol analysis for network intrusion detection[ C ]// USENIX Security Symposium. Vancouver, Canada, 2006: 257 - 272.
  • 4Caballero J, Poosankam P, Kreibich C, et al. Dispatcher: ena- bling active hornet infiltration using automatic protocol re- verse-engineering[ C]//ACM Conference on Computer and Communications Security. ACM, New York, NY, USA ,2009 : 621 - 634.
  • 5Comparetti P M, Wondracek G, Kruegel C, et al. Prospex: Protocol specification extraction [ C ]//30th IEEE Symposi- um on Security and Privacy. Oakland,CA,2009:110 -125.
  • 6Cui W, Paxson V, Weaver N C, et al. Protocol-independent adaptive replay of application dialog[ C ]//Network and Dis- tributed System Security Symposium. San Diego, CA,2006.
  • 7Beddoe M. Protocol informations project[ EB/OL]. [2012 - 2 - 18 ]. http ://www. 4tphi. net/- awalters/PI/pi, pdf.
  • 8Cui W, Kannan J, Wang H. Discoverer: Automatic protocol reverse engineering from network traces [ C ]//16th USENIX Security Symposium. USENIX,2007 : 199 - 212.
  • 9Smith T F, Waterman M S. Identification of common molec- ular subsequences[ J ]. Journal of Molecular Biology, 1981, 147 : 195 - 197.
  • 10Jain A K,Murty M N,Flynn P J. Data clustering: A review [ J ]. ACM Computing Surveys, 1999,31 (3) :265 - 281.

共引文献102

同被引文献24

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部