Syntax and behavior semantics analysis of network protocol of malware

11Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

Network protocol reverse analysis is an important aspect of malware analysis. There are many different network protocols and every protocol contains different types of fields that result in various malware behaviors. Without the protocol syntax and filed semantics, analyzers cannot understand how malware interacts with the outside network. This paper presents a syntax and a behavior semantics analysis method of the network protocol. By monitoring the way malware parse the network data and by using different fields in a virtual execution environment, this method can identify protocol fields, extract protocol syntax and correlate each syntax with malware behaviors, accordingly. This paper designs and implements the prototype Prama (protocol reverse analyzer for malware analysis). Experimental results show that this method can correctly infer protocol syntax and tag fields with meaningful malware behaviors. © Copyright 2011, Institute of Software, the Chinese Academy of Sciences.

Cite

CITATION STYLE

APA

Ying, L. Y., Yang, Y., Feng, D. G., & Su, P. R. (2011). Syntax and behavior semantics analysis of network protocol of malware. Ruan Jian Xue Bao/Journal of Software, 22(7), 1676–1689. https://doi.org/10.3724/SP.J.1001.2011.03858

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free