protocols that exhibit different behavior. Experiments
have shown that it is not easy to determine when
a model is sufficiently taught. Even knowing the pro-
tocol complexity is not a reliable indication. Because
even the simplest protocol we tested needed a larger
model than a more complex protocol. Although the
model seldom covers all possible situations, it is use-
ful for administrators to diagnose repetitive and typi-
cal protocol behavior and find possible errors.
Future work will focus on: (i) finding other au-
tomation cases for the created protocol model ; (ii) de-
signing and implementing additional communication
modeling algorithms to support other useful commu-
nication features ; (iii) a study on possibility of com-
bining different models from multiple algorithms into
one complex model; (iv) integrating timing informa-
tion into DFA edges.
ACKNOWLEDGEMENTS
This work was supported by project ”Network Diag-
nostics from Intercepted Communication” (2017-
2019), no. TH02010186, funded by the Tech-
nological Agency of the Czech Republic and by BUT
project ”ICT Tools, Methods and Technologies for
Smart Cities” (2017-2019), no. FIT-S-17-3964.
REFERENCES
Aggarwal, B., Bhagwan, R., Das, T., Eswaran, S., Padman-
abhan, V. N., and Voelker, G. M. (2009). NetPrints:
Diagnosing home network misconfigurations using
shared knowledge. Proceedings of the 6th USENIX
symposium on Networked systems design and imple-
mentation, Di(July):349–364.
Anand, A. and Akella, A. (2010). {NetReplay}: a new
network primitive. ACM SIGMETRICS Performance
Evaluation Review.
Antunes, J., Neves, N., and Verissimo, P. (2011). Reverx:
Reverse engineering of protocols. Technical Report
2011-01, Department of Informatics, School of Sci-
ences, University of Lisbon.
Burschka, S. and Dupasquier, B. (2017). Tranalyzer: Ver-
satile high performance network traffic analyser. In
2016 IEEE Symposium Series on Computational In-
telligence, SSCI 2016.
Casas, P., Zseby, T., and Mellia, M. (2016). Big-DAMA:
Big Data Analytics for Network Traffic Monitoring
and Analysis. Proceedings of the 2016 Workshop on
Fostering Latin-American Research in Data Commu-
nication Networks (ACM LANCOMM’16).
Chen, M., Zheng, A., Lloyd, J., Jordan, M., and Brewer, E.
(2004). Failure diagnosis using decision trees. Inter-
national Conference on Autonomic Computing, 2004.
Proceedings., pages 36–43.
Dhamdhere, A., Teixeira, R., Dovrolis, C., and Diot, C.
(2007). NetDiagnoser: Troubleshooting network un-
reachabilities using end-to-end probes and routing
data. Proceedings of the 2007 ACM CoNEXT.
El Sheikh, A. Y. (2018). Evaluation of the capabilities of
wireshark as network intrusion system. Journal of
Global Research in Computer Science, 9(8):01–08.
Golden, E. and Coffey, J. W. (2015). A tool to automate
generation of wireshark dissectors for a proprietary
communication protocol. The 6th International Con-
ference on Complexity, Informatics and Cybernetics,
IMCIC 2015.
Leaden, S. (2007). The Art Of VOIP Troubleshooting. Busi-
ness Communications Review, 37(2):40–44.
łgorzata Steinder, M. and Sethi, A. S. (2004). A survey
of fault localization techniques in computer networks.
Science of computer programming, 53(2):165–194.
Lodi, G., Buttyon, L., and Holczer, T. (2018). Message
Format and Field Semantics Inference for Binary Pro-
tocols Using Recorded Network Traffic. In 2018 26th
International Conference on Software, Telecommuni-
cations and Computer Networks, SoftCOM 2018.
Luo, C., Sun, J., and Xiong, H. (2007). Monitoring and
troubleshooting in operational IP-TV system. IEEE
Transactions on Broadcasting, 53(3):711–718.
Ming Luo, Danhong Zhang, G. P. L. C. (2011). An in-
teractive rule based event management system for
effective equipment troubleshooting. Proceedings
of the IEEE Conference on Decision and Control,
8(3):2329–2334.
Orzach, Y. (2013). Network Analysis Using Wireshark
Cookbook. Packt Publishing Ltd.
Proch
´
azka, M., Macko, D., and Jelemensk
´
a, K. (2017). IP
Networks Diagnostic Communication Generator. In
Emerging eLearning Technologies and Applications
(ICETA), pages 1–6.
Samhat, A., Skehill, R., and Altman, Z. (2007). Automated
troubleshooting in WLAN networks. In 2007 16th IST
Mobile and Wireless Communications Summit.
Shiva Shankar, J. and Malathi Latha, M. (2007). Trou-
bleshooting SIP environments. In 10th IFIP/IEEE In-
ternational Symposium on Integrated Network Man-
agement 2007, IM ’07.
Tong, V., Tran, H. A., Souihi, S., and Mellouk, A. (2018).
Network troubleshooting: Survey, Taxonomy and
Challenges. 2018 International Conference on Smart
Communications in Network Technologies, SaCoNeT
2018, pages 165–170.
Traverso, S., Tego, E., Kowallik, E., Raffaglio, S., Fregosi,
A., Mellia, M., and Matera, F. (2014). Exploiting hy-
brid measurements for network troubleshooting. In
2014 16th International Telecommunications Network
Strategy and Planning Symposium, Networks 2014.
Xiao, M. M., Yu, S. Z., and Wang, Y. (2009). Automatic
network protocol automaton extraction. In NSS 2009
- Network and System Security.
Zeng, H., Kazemian, P., Varghese, G., and McKeown, N.
(2012). A survey on network troubleshooting. Tech-
nical Report Stanford/TR12-HPNG-061012, Stanford
University, Tech. Rep.
Using Network Traces to Generate Models for Automatic Network Application Protocols Diagnostics
47