Browse wiki

From Navigators

Jump to: navigation, search
Abstract Network servers can be tested for correctn Network servers can be tested for correctness by resorting to a specification of the implemented protocol. However, producing a protocol specification can be a time consuming task. In addition, protocols are constantly evolving with new functionality and message formats that render the previously defined specifications incomplete or deprecated. This paper presents a methodology to automatically complement an existing specification with extensions to the protocol by analyzing the contents of the messages in network traces. The approach can be used on top of existing protocol reverse engineering techniques allowing it to be applied to both open and closed protocols. This approach also has the advantage of capturing unpublished or undocumented features automatically, thus obtaining a more complete and realistic specification of the implemented protocol. The proposed solution was evaluated with a prototype tool that was able to complement an IETF protocol (FTP) specification with several extensions extracted from traffic data collected in 320 public servers. ffic data collected in 320 public servers.
Author João Antunes + , Nuno Ferreira Neves +
Booktitle 13th European Workshop on Dependable Computing  +
Key Antunes11ewdc  +
Month may  +
NumPubDate 2,011.05  +
Project Project:MASSIF + , Project:DIVERSE +
ResearchLine Fault And Intrusion Tolerance in Open Distributed Systems (FIT) +
Title Automatically Complementing Protocol Specifications From Network Traces  +
Type inproceedings  +
Url  +
Year 2011  +
Categories Publication  +
Modification dateThis property is a special property in this wiki. 14 January 2013 14:40:51  +
hide properties that link here 
  No properties link to this page.


Enter the name of the page to start browsing from.
Personal tools
Navigators toolbox