期刊文献+

一种基于长度语义约束的报文格式挖掘方法 被引量:4

A Length Semantic Constraints Based Approach for Mining Packet Formats of Unknown Protocols
原文传递
导出
摘要 为了获得未知报文的格式,提出了基于长度语义约束的报文格式挖掘方法,该方法建立在多序列比对方法的基础上,通过对报文片段之间及其内部迭代地使用长度字段扫描算法来推断报文中的长度字段及其指称字段(组),进而获得未知协议报文的层次结构.实验结果显示出新算法的有效性:以SNMP V1报文(GetNextRequest和GetResponse)为例,对长度字段挖掘的漏报率为9.1%,误报率分别为16.7%和23.1%,获得的报文结构与协议规范也基本一致. In order to get the format of unknown protocols, a length semantic constraints based packet format mining method is proposed based on length semantic constraints. First, multiple sequence alignment method is applied to partition a packet into segments. Then, a length identification algorithm is utilized to scan the segments separately to infer length fields and corresponding referred field ( s). At last, the format (hierarchy structure) of the packets is obtained. Experiments demonstrate the effectiveness of this method : the false negative rates of length fields for GetNextRequest and GetResponse of simple network management protocol version 1 are both 9.1% , and the false positive rates are 16.7% and 23.1%. The packet hierarchy is also obtained, approximately consistent with protocol format specification.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2012年第6期55-59,共5页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(61202434 61170270 61121061) 中央高校基本科研业务费专项资金项目(2011RC0505 2011RCZJ15 2012RC0612 2011YB01)
关键词 长度字段 报文格式 协议规范挖掘 协议逆向工程 多序列比对 length field packet format protocol specification mining protocol reverse engineering multiple sequence alignment
  • 相关文献

参考文献6

  • 1李伟明,张爱芳,刘建财,李之棠.网络协议的自动化模糊测试漏洞挖掘方法[J].计算机学报,2011,34(2):242-255. 被引量:66
  • 2Vern Paxson Bro.A system for detecting network intruders in real-time[].Computer Networks.1999
  • 3W. Cui,V. Paxson,N. Weaver.Discoverer: Automatic Protocol Reverse Engineering from Network Traces[].The th USENIX Security Symposium.2007
  • 4Liu Y,Schmidt B,Maskell D L.MSAProbs: multiple sequence alignment based on pair hidden Markov models and partition function posterior probabilities[].Bioinformatics (OxfordEngland).2010
  • 5Tridgell A.How samba was written[].ht-tp:∥sambaorg/ftp/tridge/misc/french_cafetxt.2003
  • 6Beddoe M.Protocol information project. http:∥www.4tphi.net/-awalters/PI/PI.html . 2004

二级参考文献2

共引文献65

同被引文献33

  • 1张一嘉.局域网链路层数据帧识别算法的设计与实现[J].通信对抗,2007(4):41-44. 被引量:12
  • 2CHARLES V W, FABIAN M, GERALD M M. On inferring application protocol behaviors in encrypted network traffic [J].Journal of Machine Learning Research, 2006,7 (12) : 2745-2769.
  • 3CHARLES V W, FABIAN M, GERALD M M. HMM profiles for network traffic classification [C ]// Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security. New York, USA : ACM Press, 2004 ; 9-15.
  • 4JOHN H, EMI G, SAKIR S. Classification of P2P and HTTP using specific protocol characteristics [C]// Proceedings of the 15th Open European Summer School and IFIP TC6.6 Workshop (EUNICE 2009). Barcelona, Spain: Springer, 2009 : 31-40.
  • 5Paolo Milani Comparetti,Gilbert Wondracek,Christopher Kruegel,et al.Prospex:Protocol specification extraction[C]//30th IEEE Symposium on Security and Privacy,2009:110-125.
  • 6Gilbert Wondracek,Paolo Milani Comparetti,Christopher Kruegel,et al.Automatic network protocol analysis[C]//Proceedings of the 15th Annual Network and Distributed System Security Symposium,2008:125-130.
  • 7Joao Antunes,Nuno Ferreira Neves,Paulo Verissimo.Reverse engineering of protocols from network traces[C]//18th Working Conference on Reverse Engineering,2011:169-178.
  • 8PAN Fan,HONG Zheng,DU Youxiang,et al.Efficient protocol reverse method based on network trace analysis[J].International Journal of Digital Content Technology and its Applications,2012,20(6):201-210.
  • 9Luo Jianzhen,Yu Shunzheng.Position-based automatic reverse engineering of network protocols[J].Journal of Network and Computer Applications,2013,36(3):1070-1077.
  • 10Mingming X,Shunzheng Y.Recovering models of network protocol using grammatical inference[J].Procedia Engineering,2011,15:3764-3768.

引证文献4

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部