Proprietary protocol field format extraction method and device, and server

作者: Yan Xiaoyong , Bai Xiangwei , Tao Siyu , Li Qing , Mo Youquan

DOI:

关键词: AlgorithmSample (graphics)Matching (statistics)Proprietary protocolFeature (computer vision)SequenceField (computer science)Computer scienceRelation (database)Communications protocol

摘要: The present invention provides a proprietary protocol field format extraction method and device, server which are applied to the technical of network analysis. takes asample message in same type as an analysis object, comprises steps of: determining plurality feature bit sequences each sample message, taking sequence matching standard, with sequence, performing further obtain number times bits processing corresponding be function relation, maximum values boundaries messages, combination according position thebits messages order finally formats messages.

参考文章(12)
Georges Bossert, Frédéric Guihéry, Guillaume Hiet, Towards automated protocol reverse engineering using semantic information computer and communications security. pp. 51- 62 ,(2014) , 10.1145/2590296.2590346
Juan Caballero, Pongsin Poosankam, Christian Kreibich, Dawn Song, Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering computer and communications security. pp. 621- 634 ,(2009) , 10.1145/1653662.1653737
Fanzhi Meng, Yuan Liu, Chunrui Zhang, Tong Li, Yang Yue, Inferring protocol state machine for binary communication protocol Advanced Research and Technology in Industry Applications (WARTIA), 2014 IEEE Workshop on. pp. 870- 874 ,(2014) , 10.1109/WARTIA.2014.6976411
Kai Yang, Zhao Qing Zheng, Yang Fan Liu, Jilei Yin, Codeword synchronization for fiber channel protocol ,(2015)
Myung Hwangbo, Krishna Kumar Singh, Teahyung Lee, Visual search and retrieval using semantic information ,(2016)
Satya N. Yedidi, Srinivasan Embar Raghukrishnan, James M. Holland, Dmitry E. Ryzhov, Lidong Xu, Fangwen Fu, Techniques for hardware video encoding ,(2017)
Yu Hongyi, Li Qing, Tao Siyu, Zhang Qi, Wang Pengyu, Yang Baiwei, Li Linlin, Lin Rongqiang, Method and device for obtaining control field demarcation point in binary protocol data ,(2014)
Wu Xiaohui, Gu Dingfeng, Ma Hengtai, Liu Xiaoxia, Automatic vulnerability discovery system and method based on protocol reverse parsing ,(2014)
Tang Wen, Sui Aifen, Liu Yuheng, Reverse engineering method and system of protocol ,(2013)
Yan Xiaoyong, Tao Siyu, Li Qing, Ning Haokai, Ning Haobo, Liu Weicheng, Zhang Xia, Li Yang, Inexplicit protocol feature library establishment method and device and inexplicit message classification method and device ,(2016)