期刊文献+

私有工控协议分类方法研究 被引量:4

Research on classification method of private industrial control protocol
下载PDF
导出
摘要 工控协议是网络协议的一个分支,在工控系统的信息安全研究中,协议安全是其中相当重要的一部分。目前工控协议缺乏统一规范,产生了大量的私有未知协议,这些私有协议的逆向分析在报文分类方面研究有限。通过对基于网络流量的协议逆向方法研究,提出了一种私有工控协议报文分类方法,通过N-gram算法进行报文切分,然后通过关键词提取算法提取关键词,最后依据提取的关键词进行报文聚类。实验结果表明所提出的方法能对未知的工控协议进行较好的按照功能分类。 Industrial control protocol is a branch of network protocol.In the research of information security of industrial control system,protocol security is a very important part.At present,industrial control protocols are lack of unified specifications,resulting in a large number of private unknown protocols.In the face of the reverse analysis of these private protocols,the research on packet classification is limited.This paper proposes a packet classification method of private industrial control protocols by studying the protocol reverse method based on network traffic,which uses N-gram algorithm for packet segmentation,then the keywords are extracted by keyword extraction algorithm,and finally the message clustering is carried out according to the extracted keywords.Experimental results show that the proposed method can classify unknown industrial control protocols according to their functions.
作者 周帅 王绍杰 Zhou Shuai;Wang Shaojie(National Computer System Engineering Research Institute of China,Beijing 100083,China)
出处 《信息技术与网络安全》 2021年第9期19-24,共6页 Information Technology and Network Security
基金 北京市科技计划课题(Z191100004619011)。
关键词 工控协议 协议逆向 网络流量 N-GRAM industrial control protocol protocol reverse network traffic N-gram
  • 相关文献

参考文献11

二级参考文献117

  • 1张秀岭,万旻,骆建彬,邓宪.Linux下基于Squid的多能代理系统与透明网关解决方案[J].微计算机应用,2004,25(5):534-539. 被引量:5
  • 2王有远,席永明,冯雪飞,丁秋林.流程型企业SCM/ERP/MES/PCS集成系统研究[J].科技进步与对策,2004,21(11):60-62. 被引量:16
  • 3蔡罡,冯辉宗.基于协议分析状态机的入侵检测系统[J].重庆邮电学院学报(自然科学版),2005,17(1):97-101. 被引量:4
  • 4Wikipedia C. Deterministic finite automaton [ EB/OL ]. (2014- 11- 05 ) [ 2014-11-10 ]. http ://zh. wikipedia, org/wiki/DFA.
  • 5Wikipedia C. Regular expression [ EB/OL ] ( 2013-11- 22 ) [ 2014- 11-10]. http://zh, wikipedia, org/wiki/Regular.Expression.
  • 6Tridgell A. How Samba was written[ EB/OL]. (2005-02-04) [2014- 11 - 10 ]. http : samba, org/ftp/tridge/mise/french_care, txt.
  • 7Cho C', Domagoj B, Shin E, et al. Inference and analysis of formal models of botnet command and control protocols [ C ]//Proc of the 17th ACM Conference on Computer and Communications Security. ACM Press, 2010:426-439.
  • 8Nethercote N, Seward J. Valgrind: a framework for heavyweight dy- namic binary instrumentation[J]. ACM SIGPLAN Notices, 2007, 42(6) :89-100.
  • 9Song D, Brumley D, Yin Heng, et al. BitBlaze: a new approach to computer security via binary analysis [ M ]//Information Systems Secu- rity. Berlin: Springer, 2008:1-25.
  • 10Bruening D, Zhao Qin, Amarasinghe S. Transparent dynamic instru- mentation[J]. ACM SIGPLAN Notices, 2012, 47(7):133-144.

共引文献83

同被引文献33

引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部