期刊文献+

基于程序不变量的载荷特征提取方法

Extraction of Payload Signature Based on Program Invariants
原文传递
导出
摘要 应用层载荷特征是一种使用广泛、识别率高的指纹,但其生成主要依赖手工分析。针对该类特征的自动生成问题,提出一种基于程序不变量的指纹提取方法。该方法对应用程序进行插桩,跟踪应用程序处理协议数据包的过程,生成程序状态集并从中检测程序不变量,结合协议数据包中各个域的污点传播记录,获得数据包中存在的域间关系,进而提取出协议指纹。该方法具有效率高、不需分析协议语法语义、生成指纹精确性高等特点。 Application-layer payload signature is widely used and has high recognition rate, while its extraction is always dependent on manual analysis. To automatically extract the application-layer payload signature, a method based on program invariants is proposed. With program instrument technology, the program process in dealing with network packets is tracked and program status set generated and updated, and from this the program invariants are detected. Combined with taint analysis, the relationship between the invariants and packet fields is confirmed and fingerprints are revealed. This method is of high efficiency and accuracy, with no need to analyze the protocol specification.
出处 《通信技术》 2013年第9期79-82,共4页 Communications Technology
基金 高等学校博士学科点专项科研基金新教师类资助课题(No.20113402120026) 安徽省自然科学基金(No.1208085QF112) 安徽省高等学校优秀青年人才基金(No.2012SQRL001ZD) 中央高校基本科研业务费专项资金资助(No.WK2101020004)
关键词 应用层载荷特征 程序不变量 动态污点传播 application-layer payload signature program invariants dynamic taint analysis
  • 相关文献

参考文献7

  • 1DAINOTTI A, PESCAPE A, CLAFFY C K. Issues and Future Directions in Traffic Classification[J]. Network, IEEE , 2012,26(01):35-40.
  • 2周江,贾茂林,朱修阳,贺德银,秦仲学.P2P应用识别的研究[J].信息安全与通信保密,2009,31(9):96-97. 被引量:3
  • 3邓伟锋,程绍银,蒋凡,吕秀全.应用层负载特征定义及自动提取方法[J].通信技术,2012,45(7):20-23. 被引量:2
  • 4龙坤,陈庶樵,夏军波.P2P网络聚合流量识别技术研究[J].通信技术,2010,43(1):142-144. 被引量:3
  • 5AMITABH S, ALAN E. ATOM: a System for Building Customized Program Analysis Tools[C]// Proceedings of the ACM SIGPLAN 1994 conference on Programming language design and implementation. ACM Press:New York, 1994:196-205.
  • 6LUK C K, COHN R, MUTH R, et al. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation[C]//Proc. Of the 2005 ACM Conference on Programming Language Design and Implementation(PLDl ' 05). New York, NY, USA: ACM, 2005:190-200.
  • 7The Daikon Invariant Detector[EB/OL].Program Analysis Group of MIT[2012-10-31]. http://groups. csail, mit. edu/pag/daikon/.

二级参考文献16

  • 1王蕊,张顺颐.基于P2P的Skype与常规业务的流量分析和识别[J].通信技术,2007,40(5):42-45. 被引量:7
  • 2汤昊,李之棠.基于DPI的P2P流量控制系统的设计与实现[J].信息安全与通信保密,2007,29(6):94-96. 被引量:12
  • 3Gerber A, Houle J, Nguyen H, et al. P2P The Gorilla in the Cable[C]. Chicago:[s.n.], 2003:56-67.
  • 4Karagiannis T, Broido A. Transport Layer Identification of P2P Traffic[C]. USA:ACM, 2004:121-134.
  • 5Bartlett G, Heidemann J. Inherent Behaviors for On-line Detection of Peer-to-Peer File Sharing[C]. USA:[s.n.], 2007:55-60.
  • 6Constantinou F, Mavrommatis P. Identifying Known and Unknown P2P Traffic[C]. USA:IEEE Computer Society, 2006:93-102.
  • 7Subhabrata S, SPATSCHECK O, WANG Dongmei. Accurate, Scalable in-network Identification of P2P Traffic Using Application Signatures[C].USA: [s.n.],2004: 512-521.
  • 8SVEN E, SANDRINT P. Analysis and Signature of Skype VolP Session Traffic[R]. Berlin: [s.n.],2006.
  • 9HAFFNER P, SEN S, SPATSCHECK O, et al. ACAS: Automated Construction of Application Signatures[C]. USA:ACM, 2005:197-202.
  • 10PARK Byung-Chul, WON Young J, RIM Myung-Sup, et al. Towards Automated Application Signature Generation for Traffic Identification[C].USA: IEEE, 2008:160-167.

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部