期刊文献+

针对SSL/TLS协议的模糊测试框架实现

Fuzzy Test Framework for SSL/TLS Protocol
下载PDF
导出
摘要 随着网络攻击的多元化、复杂化、智能化,网络安全面临的挑战日益严峻。本文使用LCS(最长公共子序列)算法对网络通信协议数据格式进行识别,针对网络上应用较为广泛的SSL/TLS通信协议,在模式测试平台PEACH框架的基础上进行了改进。 With the diversification,complexity and intelligence of cyber attacks,the challenges facing network security are increasingly severe.In this paper,LCS(longest common subsequence)algorithm is used to identify the data format of network communication protocol.Aiming at the widely used SSL/TLS communication protocol on the network,an improvement is made on the basis of PEACH framework,a pattern testing platform.
作者 刘顺 LIU Shun(School of Information Science@Engineering Lanzhou University,Lanzhou Gansu 730000)
出处 《数字技术与应用》 2018年第12期180-180,182,共2页 Digital Technology & Application
关键词 模糊测试 LCS算法 PEACH fuzzy test LCS algorithm PEACH
  • 相关文献

参考文献3

二级参考文献12

  • 1Irvine V C, Samir Khuller. Design and Analysis of Algorithms Lecture Notes [R]. Dept. of Computer Science, University of Maryland, 2003.
  • 2Michael J Wise. String Similarity Via Greedy String Tiling and Running Karp - Rabin Matching [ D]. Sydney: Uni- versity of Sydney, 1993.
  • 3Michael J Wise. Neweyes: A System for Comparing Biological Sequences Using the Running Karp - Rabin Greedy String- Tiling Algorithm [C]. Cambridge, England: Third International Conference on Intelligent Systems for Mo- lecular Biology, 2006:393 -401.
  • 4Ukkonen E.On-line Construction of Suffix Trees[J].Algorithmica,1995,14(3):249-260.
  • 5Chi L,Hui K.Color Set Size Problem with Applications To String Matching[C]//Proceedings of the 3rd Symposium on Combinatorial Pattern Machine.Berlin,Germany:Springer,1992:230-243.
  • 6Mac Queen J B.Some Methods for Classification and Analysis of Multivariate Observations[C]//Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability.Berlin,Germany:Springer,1967:281-297.
  • 7Fischer J,Heun V.Theoretical and Practical Improvements on the RMQ-problem with Applications to LCA and LCE[C]//Proceedings of the 17th Annual Sympo-sium on Combinatorial Pattern Matching.Berlin,Germany:Springer,2006:36-48.
  • 8Poison Ivy 2.3.2 C&C Server Buffer Overflow[EB/OL].(2012-07-06).http://www.exploit-db.com/exploits/19613/.
  • 9胡静.浅析黑盒测试与白盒测试[J].衡水学院学报,2008,10(1):30-32. 被引量:17
  • 10张帅.对APT攻击的检测与防御[J].信息安全与技术,2011,2(9):125-127. 被引量:28

共引文献29

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部