KEYWORDS: Data modeling, Control systems, Reverse engineering, Binary data, Feature extraction, Computer security, Reverse modeling, Photonic integrated circuits, Data centers, Control systems design
Message clustering is the first and most crucial step in protocol reverse engineering, and the accuracy of protocol clustering directly affects protocol format extraction and state machine inference. The existing text protocol clustering methods do not apply to industrial control protocols, and the number of clusters and cluster centers cannot be determined automatically. The n-gram model is used to extract the protocol message features and construct the message feature vector for the clustering algorithm, which preserves the feature information in the protocol messages; density peak clustering is used to avoid the problem that the initial number of clusters and cluster centers cannot be determined automatically, and the automatic clustering of industrial control protocols is realized. It is tested on three commonly used industrial control protocol datasets, Modbus, DNP3, and S7common, and achieves good results on two metrics, purity and F1 score.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.