Dynamic Combined with Static Analysis for Mining Network Protocol's Hidden Behavior

Dynamic Combined with Static Analysis for Mining Network Protocol's Hidden Behavior

Yanjing Hu, Qingqi Pei
DOI: 10.4018/ijbdcn.2017070101
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Unknown protocol's hidden behavior is becoming a new challenge in network security. This paper takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly, monitor and analyze the process of protocol program parses the message in the virtual platform HiddenDisc prototype system developed by the authors, record the protocol's public behavior, then based on the authors' proposed Hidden Behavior Perception and Mining algorithm, static analyze the protocol's hidden behavior trigger conditions and hidden behavior instruction sequences. According to the hidden behavior trigger conditions, new protocol messages with the sensitive information are generated, and the hidden behaviors are executed by dynamic triggering. HiddenDisc prototype system can sense, trigger and analyze the protocol's hidden behaviors. According to the statistical analysis results, the authors propose the evaluation method of Protocol Execution Security. The experimental results show that the present method can accurately mining the protocol's hidden behaviors, and can evaluate unknown protocol's execution security.
Article Preview
Top

1. Introduction

Having more knowledge of network protocol is of great value in many network security applications, such as deep packet inspection (Bossert, Guihéry, & Hiet, 2014), botnet analysis (Chang, Mohaisen, Wang, & Chen, 2015), vulnerability discovery (Rafique, Caballero, Huygens, & Joosen, 2014) and signature generation (Wang, Xiang, Zhou, & Yu, 2012). Most protocol reverse analysis focus on analyzing and inferring an unknown protocol specifications, such as message format and fields (Caballero & Song, 2013; Meijian Li, 2013), but pay little attention to the protocol's behavior. The fundamental role of the protocol behavior analysis is more important, because a protocol's behavior, especially its hidden behavior affects the protocol's execution security, which is directly related to the foundation of network security and grid security (Hailong Sun, 2011; Hoang, 2012; Papavassiliou, 2008; Sabri Pllana, 2009).

Protocol reverse analysis may be the best way to study unknown protocol’s hidden behavior. The hidden behaviors we face are varied and sometimes may be calamitous. For some protocols, the malicious functions, special modules or key code segments are encrypted, confused or control flow obfuscated. For other protocols, the malicious behaviors are embedded into normal behaviors, and they could be triggered only under specific conditions. Traditional network security technologies have less effective for hidden behavior, and may affect the normal communication, because a concealed malicious behavior does not replicate or spread, and even has no significant malicious characteristic. The growing invisibility, robustness and survivability of a hidden behavior make the traditional analysis, tracking and recognition more difficult. How to grasp a general analysis method which can mine and explore the unknown protocol's hidden behavior quickly and accurately is becoming a new challenge for network security. Mining a protocol's hidden behavior is a key problem that could not be avoided for protocol reverse analysis. The proposed method opens up a new avenue of protocol behavior research in network and cloud security (Chen, 2015; Ficco, 2013; Mansour, 2015; Pereira, 2015).

Recently binary analysis plays a vital role in combating the rapidly growing unknown protocols (Caballero & Song, 2013; Fanzhi Meng 2014; Li Xiang-Dong, 2011). Most existing analysis algorithms operate on either static message features (Wondracek, 2008) or dynamic behavior features (Fanzhi Meng 2014; Juan Caballero, 2012). However, these two distinct approaches have their own strengths and weaknesses in handling different types of protocol hidden behaviors (Wendzel & Keller, 2014). Although the ideas of combining static and dynamic have been mentioned in both industry and academia (Ying WANGa, 2013), very few have addressed their systematic integration. In this paper, we propose a novel method of integrating dynamic and instruction clustering analysis to mine an unknown protocol’s hidden behavior regardless the types and hidden techniques the protocol uses. It just relies on the protocol’s binary raw data (including both binary code and protocol message) to quickly cluster protocol’s behaviors and to finally explore its hidden behavior.

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2025): Forthcoming, Available for Pre-Order
Volume 19: 1 Issue (2024)
Volume 18: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 17: 2 Issues (2021)
Volume 16: 2 Issues (2020)
Volume 15: 2 Issues (2019)
Volume 14: 2 Issues (2018)
Volume 13: 2 Issues (2017)
Volume 12: 2 Issues (2016)
Volume 11: 2 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing