Protocols Analysis by Base-Function

Article Preview

Abstract:

A new description method of protocol structure is presented by base-function firstly. Then, a protocol analysis method base on it is proposed. To analyses the private protocols, a new self-learning algorithm is discussed. Finally, the flow of protocol analysis based on base-function is given. Experiment results show the efficiency of presented method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

682-685

Citation:

Online since:

February 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Wireshark User Manual, http: /man. 1upaworld. com/content/network/wireshark.

Google Scholar

[2] X. Long; Design and Implementation of Network Protocol Analysis System. Computer Programming Skills & Maintenance. 8(2009)74-76.

Google Scholar

[3] C. Liang, G. Jian, Xu Xuan; Application-Level Protocol Identification Algorithm . Computer Science. 3 (7) (2007)73 -75.

Google Scholar

[4] C. Shuhui, S. Jinshu; Protocol Identification Research Based on Content Analysis. Journal of National University of Defense Technology, 30 (4) (2008)82- 87.

Google Scholar

[5] F. Huiping, X. Lei, C. Shuhui, et al. Application-Layer Protocol Identification Based on Regular Expressions. Computer Research and Development, 45(2008)438-443.

Google Scholar

[6] L. Xiongwei, Z. Qiang, X. Kaiquan. Study on Protocol Identification Algorithm Based on Decision Tree. Microcomputer Information, 25 (9-3)(2009)25-26.

Google Scholar

[7] S. Meihong, Y. Weiwei, L. Yonggang. Ethereal-based CORBA Communication Protocol Parsing Function. Computer Engineering and Design, 26 (12) (2005)3236 -3239.

Google Scholar

[8] S. Owen, P. Brereton, D. Budgen. Protocol analysis:A neglected practice. Communications of the ACM. 49(2)(2006)117-122.

DOI: 10.1145/1113034.1113039

Google Scholar

[9] T. Abbes, A. Bouhoula, M. Rusinowiteh. Protocol Analysis in Intrusion Detection Using Decision Tree. Proceedings of the International Conference on Information Technology: Coding and Computing. USA, (2004), 1253-1261.

DOI: 10.1109/itcc.2004.1286488

Google Scholar

[10] W. Jinchao, L. Fei, C. Mingyu. Design and Implementation of Protocol Analysis Algorithm for Network Data Package, Computer Technology and Development, 16(4)(2006)77-80.

Google Scholar

[11] F. Risso, L. Degioanni. An architecture for high performance network analysis. Proceedings of the Sixth IEEE Symposium on Computers and Communications. (2001)686-693.

DOI: 10.1109/iscc.2001.935450

Google Scholar