期刊文献+

面向二进制数据帧的聚类系统 被引量:3

Cluster system for binary data frame
下载PDF
导出
摘要 为了分离复杂无线网络环境下获取到的二进制数据帧,为后续协议逆向解析提供前提条件,实现了对复杂协议簇协议的聚类系统。首先使用AC算法挖掘出二进制数据帧中的频繁序列特征;然后创新地使用了Apriori算法搜索分析这些特征的关联关系,并且结合二进制流数据帧的特点对结果进行了四步剪枝处理;最后利用筛选出的特征通过改进的K-means算法进行聚类。实验表明,该系统可以对二进制协议数据帧的聚类起到很好的效果,同时对存在TYPE字段的多层协议簇,还能进一步区分出多种协议间的层次关系。 In the complex wireless network environment, in order to separate binary data frames for subsequent reverse protocol analysis,this paper proposed a frame cluster system designed for binary frames using complex protocol stacks. It first used AC algo-rithm to get the frequent set characteristics of the binary frames ,then creatively used the Apriori algorithm to explore the relationship between these characteristics and the 4-step pruning process to choose the most important characteristics, and finally used the selected characteristics and their relationships, in the K-means algorithm to cluster the frames. Experiments show that the result is good,and if the protocol type segments exist,it is possible to distinguish the layered relationships between different clusters.
出处 《计算机应用研究》 CSCD 北大核心 2015年第3期909-911,916,共4页 Application Research of Computers
基金 中国工程物理研究院科学技术发展基金资助项目(2012A0403021)
关键词 协议逆向工程 无线网络 协议帧聚类 频繁序列 AC算法 APRIORI算法 K-MEANS算法 Key words: protocol reverse engineering wireless network protocol frame cluster frequent set AC algorithm Apriorialgorithm K-means algorithm
  • 相关文献

参考文献11

  • 1CUI Wei-dong, PAXSON V,WEAVER N C, et al. Protocol indepen- dent adaptive replay of application dialog [ C]//Proc of the 13th Annual Network and Distributed System Security Symposium. 2006.
  • 2DREGER tt,FELDMANN A, MAI M,et al. Dynamic application layer protocol analysis for network intrusion detection [ C ]//Proc of USE- NIX Security Symposium. 2006:257-272.
  • 3CABALLERO J, POOSANKAM P, KRE1BICH C, et al. Dispatcher: enabling active hornet infiltration using automatic protocol reverse en- gineering[ C ]//Proc of ACM Conference on Computer and Communi- cations Security. New York : ACM Press,2009:621 - 634.
  • 4李伟明,张爱芳,刘建财,李之棠.网络协议的自动化模糊测试漏洞挖掘方法[J].计算机学报,2011,34(2):242-255. 被引量:66
  • 5COMPARETFI P M, WONDRACEK G, KRUEGEL C, et al. Prospex : protocol specification extraction [ C ]//Proc of the 30th IEEE Sympo- sium on Security and Privacy. 2009:110-125.
  • 6BEDDOE M. Protocol information project [ EB/OL]. [ 2012-02-18 ]. http ://www. 4tphi. net/- awalters/Pl/pi, pdf.
  • 7CUI Wei-dong,KANNAN J, WANG H J. Discoverer:automatic proto- col reverse engineering from network traces [ C~//Proc of the 16th USE NIX Security Symposium. 2007:199-212.
  • 8宋疆,张春瑞,张楠,李芬,吴艳梅.基于数据报指纹关系的未知协议识别与发现[J].计算机应用研究,2012,29(12):4604-4606. 被引量:5
  • 9WAINER J, KUMAR A. A fine-grained, controllable user-to-user dele- gation method in RBAC [ C ]//Proc of the lOth ACM Symposium on Access Control Models and Technologies. New York: ACM Press, 2005:59- 66.
  • 10CRAMPTON J,KHAMBHAMMETrU H. Delegation in role-based ac- cess control [ J ]. International Journal of Information Security, 2008,7(2) :123-136.

二级参考文献28

  • 1杨武,方滨兴,云晓春,张宏莉.入侵检测系统中高效模式匹配算法的研究[J].计算机工程,2004,30(13):92-94. 被引量:23
  • 2刘立芳,霍红卫,王宝树.PHGA-COFFEE:多序列比对问题的并行混合遗传算法求解[J].计算机学报,2006,29(5):727-733. 被引量:11
  • 3卢汪节,鞠时光.入侵检测系统中一种改进的AC算法[J].计算机工程与应用,2006,42(15):146-148. 被引量:6
  • 4Ravi S Sendhu. Future directions in role-based access control models. In: Vladimir I Gorodetski et al eds. Proc of the Mathematical Methods, Models, and Architectures for Network Security Systems. Lecture Notes in Computer Science 2052.Berlin: Springer, 2001. 22~26
  • 5Ravi S Sandhu et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~47
  • 6Sylvia L Osbom et al. Configuring role-based access control to enforce mandatory and discretionary access control policies.TISSEC, 2000, 3(2): 85~106
  • 7Gail-Joon Ahn, Ravi S Sandhu. The RSL99 language for rolebased separation of duty constraints. The 4th ACM Workshop on RBAC, Fairfax, Virginia, United States, 1999
  • 8Ravi S Sandhu, Venkata Bhamidipati et al. The ARBAC97 model for role-based administration of roles. TISSEC, 1999, 2(1): 105~135
  • 9David F Ferraiolo, Ravi Sandhu. A proposed standard for rolebased access control. ACM Trans on Information and System Security, 2001, 4(3): 25~29
  • 10Trusted solaris operating environment: http://www.sun.com/software/solaris/trustedsolaris/

共引文献100

同被引文献17

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部