期刊文献+

基于网络报文流量的协议密文分析方法

原文传递
导出
摘要 应用层各种载荷特征对密码协议安全性进行分析至关重要。现有方法仅考虑报文载荷中的明文信息,无法有效利用密文数据信息特征。本文基于密文长度特征和报文载荷内容相关特征对协议密文所使用的加密体制进行分析识别,为密文数据信息的有效利用提供了新的解决思路。
机构地区 解放军 解放军
出处 《网络安全技术与应用》 2020年第11期41-43,共3页 Network Security Technology & Application
  • 相关文献

参考文献2

二级参考文献27

  • 1赵咏,姚秋林,张志斌,郭莉,方滨兴.TPCAD:一种文本类多协议特征自动发现方法[J].通信学报,2009,30(S1):28-35. 被引量:10
  • 2Caballero J, Yin H, Liang Zhenkai, et al. Polyglot: Automatic extraction of protocol message format using dynamic binary analysis [C]//Proc of the 14th ACM Conf on Computer and Communications Security. New York: ACM, 2007:317-329.
  • 3Cui Weidong, Peinado M, Chen K, et al. Tupni: Automatic reverse engineering of input formats [C] //Proc of the 15th ACM Conl on Computer and Communications Security. New York: ACM, 2008: 391-402.
  • 4Comparetti P M, Wondracek G, Kruegel C,et al. Prospex: Protocol specification extraction [C] //Proc of the 30th IEEE Syrup on Security and Privacy. Los Alamitos, CA: IEEE Computer Society, 2009:110-125.
  • 5Wang Zhi, Jiang Xuxian, Cui Weidong, et al. ReFormat: Automatic reverse engineering of encrypted messages [C] // Proc of the 4th European Syrup on Research in Computer Security. Berlin.. Springer, 2009; 200-215.
  • 6Caballero J, Poosankam P, Kreibich C, et al. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering [C] //Proc of the 16th ACM Conf on Computer and Communications Security. New York: ACM, 2009:621-634.
  • 7Caballero J, Song D. Automatic protocol reverse-engineering : Message format extraction and field semantics inference [J]. Computer Network, 2013, 57(2): 451-474.
  • 8Byung-Chul P, Won Y J, Mynng-Sup K, et al. Towards automated application signature generation for traffic identification [C] //Proc of the Network Operations and Management Symp. Piscataway, NJ: IEEE, 2008:160-167.
  • 9Ye Mingjiang, Xu Ke, Wu Jianping, et al. AutoSig- automatically generating signatures for applications [C] // Proc of the 9th IEEE Int Conf on Computer and Information Technology. Los Alamitos, CA: IEEE Computer Society, 2009 : 104-109.
  • 10Wang Yu, Xiang Yang, Zhou Wanlei, et al. Generating regular expression signatures for network traffic classification in trusted network management [J]. Journal of Network and Computer Applications, 2012, 35(2): 992-1000.

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部