Recognition of network protocols is one of the most important steps in the intelligent algorithms for detecting incidents and anomalies in information security systems. In cases where there is no formal specification and documentation of protocols, it is necessary to apply approaches from the field of reverse engineering of protocols. The accuracy of some of these approaches can be improved by applying them not to the entire raw traffic dump, but to separate groups corresponding to one protocol stack.In this paper, a method is proposed for dividing the traffic dump into groups in accordance with the packet protocol stack. A key feature of the approach is the use of transformer-based models to construct contextualized vector representations of traffic packets, which will then be used as features in clustering. We demonstrate through a series of experiments that the proposed approach efficiently works on different types of network traffic and allows us to improve the quality of packets clustering, surpassing the previously proposed methods.
Original languageEnglish
Title of host publication2023 18th International Symposium on Problems of Redundancy in Information and Control Systems, REDUNDANCY 2023
Subtitle of host publicationbook
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages47-50
Number of pages4
ISBN (Print)979-835038152-8
DOIs
Publication statusPublished - 24 Oct 2023
Event2023 XVIII International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY) - Moscow, Russian Federation
Duration: 24 Oct 202327 Oct 2023

Conference

Conference2023 XVIII International Symposium Problems of Redundancy in Information and Control Systems (REDUNDANCY)
Period24/10/202327/10/2023

ID: 50620800