Abstract

Internet of Things (IoT) is the development and extension of computer, Internet, and mobile communication network and other related technologies, and in the new era of development, it increasingly shows its important role. To play the role of the Internet of Things, it is especially important to strengthen the network communication information security system construction, which is an important foundation for the Internet of Things business relying on Internet technology. Therefore, the communication protocol between IoT devices is a point that cannot be ignored, especially in recent years; the emergence of a large number of botnet and malicious communication has seriously threatened the communication security between connected devices. Therefore, it is necessary to identify these unknown protocols by reverse analysis. Although the development of protocol analysis technology has been quite mature, it is impossible to identify and analyze the unknown protocols of pure bitstreams with zero a priori knowledge using existing protocol analysis tools. In this paper, we make improvements to the existing protocol analysis algorithm, summarize and learn from the experience and knowledge of our predecessors, improve the algorithm ideas based on the Apriori algorithm idea, and perform feature string finding under the idea of composite features of CFI (Combined Frequent Items) algorithm. The advantages of existing algorithm ideas are combined together to finally propose a more efficient OFS (Optimal Feature Strings) algorithm with better performance in the face of bitstream protocol feature extraction problems.

Highlights

  • As the global economy continues to develop, the impact of scientific and technological advances on the daily lives of people around the world is gradually increasing. e Internet of ings (IoT) technology, which is derived from the advancement of science and technology, has been developed significantly and has been applied in various industries around the world. e Internet of ings (IoT) has emerged in the context of information technology development, and its degree of development has been influenced by the processing power of information technology in the information age [1,2,3,4]

  • E rest of this paper is organized as follows: the first part introduces the current state of development and security issues of IoT technology worldwide, and the second part presents our work related to the unknown protocol parsing

  • In order to avoid and improve the shortcomings of the algorithm described in the previous section, OFS, a protocol feature extraction algorithm based on the idea of the Apriori algorithm and the idea of composite features of CFI, is proposed, which is different from the idea of CFI algorithm

Read more

Summary

Introduction

As the global economy continues to develop, the impact of scientific and technological advances on the daily lives of people around the world is gradually increasing. e Internet of ings (IoT) technology, which is derived from the advancement of science and technology, has been developed significantly and has been applied in various industries around the world. e Internet of ings (IoT) has emerged in the context of information technology development, and its degree of development has been influenced by the processing power of information technology in the information age [1,2,3,4]. E current network protocol analysis method, with the huge number of analyzed protocol frames and the complexity of the data frames themselves, can take a long time for the algorithm to run, and how to optimize the algorithm is a research direction that needs to be continuously studied. E rest of this paper is organized as follows: the first part introduces the current state of development and security issues of IoT technology worldwide, and the second part presents our work related to the unknown protocol parsing. E third part proposes a new protocol format analysis algorithm. e fourth part analyzes the performance of the new algorithm from several aspects and compares it with other algorithms. e fifth part concludes the work

Related Work
Protocol Feature Extraction Algorithm
Algorithm Ideas
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call