Skip to content

Commit 3ee2cb7

Browse files
author
bitpeach
authored
Update README.md
1 parent 3ffee6c commit 3ee2cb7

File tree

1 file changed

+20
-1
lines changed

1 file changed

+20
-1
lines changed

README.md

Lines changed: 20 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,21 @@
11
# Protocol-Informatics
2-
“Protocol Informatics” is a project to design for automatically network protocol reverse engineering based on frame or packet analysis. "PI" is short for “Protocol Informatics”, which introduces local and global sequence alignment algorithms. The PI project is famous in network protocol reverse engineering based on network trace. I am not the author of PI project. However, the previous website storing PI project disappeared. That makes me to open a github issue to keep the codes of PI poject.
2+
“Protocol Informatics” is a project to design for automatically network protocol reverse engineering based on frame or packet analysis. "PI" is short for “Protocol Informatics”, which introduces local and global sequence alignment algorithms. The PI project is famous in network protocol reverse engineering based on network trace. I am **not** the author of PI project but an amateur of PI project. However, the previous website storing old codes of PI project has been disappeared. That warns and makes me to open a github issue to keep the codes of PI poject for the convenience of other researchers.
3+
4+
# What is network protocol reverse engineering
5+
* According to reference, a certain of traffic on backbone networks worldwide comprises protocols of nonpublic descriptions such as C&C botnet servers, data link networks, wireless network protocols, instant messaging protocols and industrial control protocols.
6+
7+
* Automatic protocol reverse engineering processes undocumented protocols to deduce message formats without a priori knowledge of protocol specifications. With the help of closed-protocol analysis, network protocol reverse engineering (NPRE) plays an important role in network management and security applications (e.g. intrusion detection systems and vulnerability mining).
8+
9+
* In early, network protocol analysis is currently performed by hand using only intuition and a protocol analyzer tool such as tcpdump or Ethereal. Now, automatic analysis way is developed by the researchers because of the time-consumig work in the NPRE. To date, network-based, program-based and hybrid methods have constituted the types of NPRE techniques.
10+
11+
# What is the algorithm of PI (Protocol Informatics)
12+
* An early attempt in automatic NPRE, the Protocol Informatics (PI) Project (as this Github Repository shown), applied a multiple sequence alignment (MSA) algorithm to extract the protocol structure and infer message fields from network traces.
13+
14+
* The core of PI project is the sequence alignment. The author of PI project found the sequence alignment algorithm from bioinformatics is able to applicable for field extraction of protocol sequences as well. The sequence alignment algorithm at first was used for the DNA similarity detection.
15+
16+
* The principle of algorithm can be outlined as the follow.
17+
18+
![](https://github.com/bitpeach/Protocol-Informatics/blob/master/PI%20paper%20figure.png)
19+
20+
# What is code of PI
21+
* PI code was writted by Python 2.x. In the old version, PI.tgz imported the Numerical Function which was outdated. So, the author has produced the PI-0.02 beta version which has conquered the Numertical wanrings.

0 commit comments

Comments
 (0)