期刊文献+

多方安全协议会话重构方法

原文传递
导出
摘要 如何对安全协议会话进行有效重构是信息安全领域的关键问题。针对分布在多个流的多方安全协议会话重构问题,本文提取属于同一会话的流之间的三个关联特征,并据此给出多方安全协议会话实例重构方法。最后,针对三种会话运行场景下的三个典型多方安全协议进行实验,实验结果表明该方法能够有效重构协议会话。
作者 谢福财
机构地区 解放军
出处 《网络安全技术与应用》 2020年第10期17-19,共3页 Network Security Technology & Application
  • 相关文献

参考文献2

二级参考文献29

  • 1赵咏,姚秋林,张志斌,郭莉,方滨兴.TPCAD:一种文本类多协议特征自动发现方法[J].通信学报,2009,30(S1):28-35. 被引量:10
  • 2Caballero J, Yin H, Liang Zhenkai, et al. Polyglot: Automatic extraction of protocol message format using dynamic binary analysis [C]//Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007:317-329.
  • 3Cui Weidong, Peinado M, Chen K, et al. Tupni: Automatic reverse engineering of input formats [C] //Proc of the 15th ACM Conl on Computer and Communications Security. New York: ACM, 2008: 391-402.
  • 4Comparetti P M, Wondracek G, Kruegel C,et al. Prospex: Protocol specification extraction [C] //Proc of the 30th IEEE Syrup on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2009:110-125.
  • 5Wang Zhi, Jiang Xuxian, Cui Weidong, et al. ReFormat: Automatic reverse engineering of encrypted messages [C] // Proc of the 4th European Syrup on Research in Computer Security. Berlin.. Springer, 2009; 200-215.
  • 6Caballero J, Poosankam P, Kreibich C, et al. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering [C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:621-634.
  • 7Caballero J, Song D. Automatic protocol reverse-engineering : Message format extraction and field semantics inference [J]. Computer Network, 2013, 57(2): 451-474.
  • 8Byung-Chul P, Won Y J, Mynng-Sup K, et al. Towards automated application signature generation for traffic identification [C] //Proc of the Network Operations and Management Symp. Piscataway, NJ: IEEE, 2008:160-167.
  • 9Ye Mingjiang, Xu Ke, Wu Jianping, et al. AutoSig- automatically generating signatures for applications [C] // Proc of the 9th IEEE Int Conf on Computer and Information Technology. Los Alamitos, CA: IEEE Computer Society, 2009 : 104-109.
  • 10Wang Yu, Xiang Yang, Zhou Wanlei, et al. Generating regular expression signatures for network traffic classification in trusted network management [J]. Journal of Network and Computer Applications, 2012, 35(2): 992-1000.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部