Blind Identification of Communications Networks in Service Layer

Document Type : Original Article

Authors

1 University of Tehran

2 imam hossein university

Abstract

One of the major challenges in electronic and cyber warfare is to achieve maximum information from the intercepted signals of a communications network. To this aim, the first step is reverse engineering of the physical and data transmission layers in order to obtain the transmitted packets. In the next step, service layer should be identified. In this step, the exact meaning of each packet along with the communications state machine should be identified. By completing these tasks, the information content exchanged through the network would be available. In this paper, a comprehensive scheme is proposed for identification of the service layer. With the intention of proving proficiency of the proposed scheme, usability of this scheme for identification of nine different standards, including GSM, LTE, HSDPA, DVB-S2, FLEX, 

Keywords


[1]        S. Kleber, L. Maile, and F. Kargl, “Survey of Protocol Reverse Engineering Algorithms: Decomposition of Tools for Static Traffic Analysis,” IEEE Communications Surveys & Tutorials, 2018.##
[2]        K. Zhang, E. L. Xu, Z. Feng, and P. Zhang, “A Dictionary Learning Based Automatic Modulation Classification Method,” IEEE Access, vol. 6, pp. 5607-5617, 2018.##
[3]        R. Gupta, S. Majhi, and O. A. Dobre, “Design and Implementation of a Tree-Based Blind Modulation Classification Algorithm for Multiple-Antenna Systems,” IEEE Transactions on Instrumentation and Measurement, 2018.##
[4]        T. Li, Y. Li, Y. Chen, L. J. Cimini Jr, and H. Zhang, “Estimation of MIMO Transmit-Antenna Number Using Higher-Order Moments Based Hypothesis Testing,” IEEE Wireless Communications Letters, vol. 7, pp. 258-261, 2018.##
[5]        O. A. Dobre, “Signal Identification for Emerging Intelligent Radios: Classical Problems and New Challenges,” IEEE Instrumentation & Measurement Magazine, vol. 18, pp. 11-18, 2015.##
[6]        A. G. Soteh and H. K. Bizaki, “On the Analytical Solution of Rank Problem in the Convolutional Code Identification Context,” IEEE Communications Letters, vol. 20, pp. 442-445, 2016.##
[7]        R. Swaminathan, A. Madhukumar, G. Wang, and T. S. Kee, “Blind Reconstruction of Reed-Solomon Encoder and Interleavers Over Noisy Environment,” IEEE Transactions on Broadcasting, vol. 64, pp.   830-845, 2018.##
[8]        P. Yu, J. Li, and H. Peng, “A least square method for parameter estimation of RSC sub-codes of turbo codes,” IEEE Communications Letters, vol. 18, pp. 644-647, 2014.##
[9]        A. Jamshidi, A. Keshavarz-Hadad, and F. Zare, “Estimation of Convolutional Interleaver Parameters in the Burst and BSC Channels,” Iranian Journal of Science and Technology, Transactions of Electrical Engineering, vol. 40, pp. 93-102, 2016.##
[10]      S. Han and M. Zhang, “A Method for Blind Identification of a Scrambler Based on Matrix Analysis,” IEEE Communications Letters, vol. 22, pp. 2198-2201, 2018.##
 [11]     Y. Wang, X. Yun, M. Z. Shafiq, L. Wang, A. X. Liu, Z. Zhang, et al., “A Semantics Aware Approach to Automated Reverse Engineering Unknown Protocols,” in 20th IEEE International Conference on Network Protocols, pp. 1-10, 2012.##
[12]      W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-Briz, “Tupni: Automatic Reverse Engineering of Input Formats,” in 15th ACM conference on Computer and communications security, pp. 391-402, 2008.##
[13]      Z. Lin, X. Jiang, D. Xu, and X. Zhang, “Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution,” in NDSS, pp. 1-15, 2008.##
[14]      P. M. Comparetti, G. Wondracek, C. Kruegel, and E. Kirda, “Prospex: Protocol Specification Extraction,” in Security and Privacy, 2009 30th IEEE Symposium on, pp. 110-125, 2009.##
[15]      G. Wondracek, P. M. Comparetti, C. Kruegel, E. Kirda, and S. S. S. Anna, “Automatic Network Protocol Analysis,” in NDSS, pp. 1-14, 2008.##
[16]      M. McDaniel and M. H. Heydari, “Content Based File Type Detection Algorithms,” in 36th Annual Hawaii International Conference on System Sciences, p. 10, 2003.##
[17]      W. C. Calhoun and D. Coles, “Predicting the Types of File Fragments,” digital investigation, vol. 5, pp.  S14-S20, 2008.##
[18]      Q. Zhang, L. T. Yang, Z. Chen, and F. Xia, “A    High-Order Possibilistic C-Means Algorithm for Clustering Incomplete Multimedia Data,” IEEE Systems Journal, vol. 11, pp. 2160-2169, 2017.##