International Journal for Technological Research in Engineering (IJTRE)
Protocol reverse engineering has been a manual process that is considered tedious, time-consuming and error-prone. To tackle this limitation, many solutions have been proposed recently to allow automatic protocol reverse engineering. Application-level protocol specifications are helpful for many safety measures, including detection and intrusion prevention that performs traffic normalization, deep packet inspection and penetration testing that produces network inputs application to expose potential vulnerabilities. Though, current practice in deriving protocol specifications is mostly manual. In this paper, the authors present a tool for reverse engineering the protocol message formats of an application to trace network automatically.