期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Protocol Format Extraction Based on an Improved CFSM Algorithm 被引量:2
1
作者 Peihong Lin Zheng Hong +2 位作者 Lifa Wu Yihao Li Zhenji Zhou 《China Communications》 SCIE CSCD 2020年第11期156-180,共25页
As the information technology rapidly develops,many network applications appear and their communication protocols are unknown.Although many protocol keyword recognition based protocol reverse engineering methods have ... As the information technology rapidly develops,many network applications appear and their communication protocols are unknown.Although many protocol keyword recognition based protocol reverse engineering methods have been proposed,most of the keyword recognition algorithms are time consuming.This paper firstly uses the traffic clustering method F-DBSCAN to cluster the unknown protocol traffic.Then an improved CFSM(Closed Frequent Sequence Mining)algorithm is used to mine closed frequent sequences from the messages and identify protocol keywords.Finally,CFGM(Closed Frequent Group Mining)algorithm is proposed to explore the parallel,sequential and hierarchical relations between the protocol keywords and obtain accurate protocol message formats.Experimental results show that the proposed protocol formats extraction method is better than Apriori algorithm and Sequence alignment algorithm in terms of time complexity and it can achieve high keyword recognition accuracy.Additionally,based on the relations between the keywords,the method can obtain accurate protocol formats.Compared with the protocol formats obtained from the existing methods,our protocol format can better grasp the overall structure of target protocols and the results perform better in the application of protocol reverse engineering such as fuzzing test. 展开更多
关键词 flow clustering CFSM algorithm closed frequent sequences keyword recognition CFGM algorithm keyword relations format categorization
下载PDF
Unsupervised Binary Protocol Clustering Based on Maximum Sequential Patterns 被引量:2
2
作者 Jiaxin Shi Lin Ye +1 位作者 Zhongwei Li Dongyang Zhan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2022年第1期483-498,共16页
With the rapid development of the Internet,a large number of private protocols emerge on the network.However,some of them are constructed by attackers to avoid being analyzed,posing a threat to computer network securi... With the rapid development of the Internet,a large number of private protocols emerge on the network.However,some of them are constructed by attackers to avoid being analyzed,posing a threat to computer network security.The blockchain uses the P2P protocol to implement various functions across the network.Furthermore,the P2P protocol format of blockchain may differ from the standard format specification,which leads to sniffing tools such as Wireshark and Fiddler not being able to recognize them.Therefore,the ability to distinguish different types of unknown network protocols is vital for network security.In this paper,we propose an unsupervised clustering algorithm based on maximum frequent sequences for binary protocols,which can distinguish various unknown protocols to provide support for analyzing unknown protocol formats.We mine the maximum frequent sequences of protocolmessage sets in bytes.Andwe calculate the fuzzymembership of the protocolmessage to each maximum frequent sequence,which is based on fuzzy set theory.Then we construct the fuzzy membership vector for each protocol message.Finally,we adopt K-means++to split different types of protocol messages into several clusters and evaluate the performance by calculating homogeneity,integrity,and Fowlkes and Mallows Index(FMI).Besides,the clustering algorithms based onNeedleman–Wunsch and the fixed-length prefix are compared with the algorithm presented in this paper.Compared with these traditional clustering methods,we demonstrate a certain improvement in the clustering performance of our work. 展开更多
关键词 Binary protocol blockchain maximum frequent sequence protocol message clustering protocol reverse engineering
下载PDF
Bit Stream Oriented Enumeration Tree Pruning Algorithm
3
作者 邱卫东 金凌 +1 位作者 杨小牛 杨红娃 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第5期567-570,共4页
Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an... Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an unknown format. It is certain that data can be cut into packets because there are usually characteristic bit sequences in packet headers. The key to solve the problem is how to find out those characteristic sequences. We present an efficient way of bit sequence enumeration. Both Aho-Corasick (AC) algorithm and data mining method are used to reduce the cost of the process. 展开更多
关键词 pattern matching data mining frequent set frequent sequence association rule
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部