[1]
Wireshark User Manual, http: /man. 1upaworld. com/content/network/wireshark.
Google Scholar
[2]
X. Long; Design and Implementation of Network Protocol Analysis System. Computer Programming Skills & Maintenance. 8(2009)74-76.
Google Scholar
[3]
C. Liang, G. Jian, Xu Xuan; Application-Level Protocol Identification Algorithm . Computer Science. 3 (7) (2007)73 -75.
Google Scholar
[4]
C. Shuhui, S. Jinshu; Protocol Identification Research Based on Content Analysis. Journal of National University of Defense Technology, 30 (4) (2008)82- 87.
Google Scholar
[5]
F. Huiping, X. Lei, C. Shuhui, et al. Application-Layer Protocol Identification Based on Regular Expressions. Computer Research and Development, 45(2008)438-443.
Google Scholar
[6]
L. Xiongwei, Z. Qiang, X. Kaiquan. Study on Protocol Identification Algorithm Based on Decision Tree. Microcomputer Information, 25 (9-3)(2009)25-26.
Google Scholar
[7]
S. Meihong, Y. Weiwei, L. Yonggang. Ethereal-based CORBA Communication Protocol Parsing Function. Computer Engineering and Design, 26 (12) (2005)3236 -3239.
Google Scholar
[8]
S. Owen, P. Brereton, D. Budgen. Protocol analysis:A neglected practice. Communications of the ACM. 49(2)(2006)117-122.
DOI: 10.1145/1113034.1113039
Google Scholar
[9]
T. Abbes, A. Bouhoula, M. Rusinowiteh. Protocol Analysis in Intrusion Detection Using Decision Tree. Proceedings of the International Conference on Information Technology: Coding and Computing. USA, (2004), 1253-1261.
DOI: 10.1109/itcc.2004.1286488
Google Scholar
[10]
W. Jinchao, L. Fei, C. Mingyu. Design and Implementation of Protocol Analysis Algorithm for Network Data Package, Computer Technology and Development, 16(4)(2006)77-80.
Google Scholar
[11]
F. Risso, L. Degioanni. An architecture for high performance network analysis. Proceedings of the Sixth IEEE Symposium on Computers and Communications. (2001)686-693.
DOI: 10.1109/iscc.2001.935450
Google Scholar