Protocols Analysis Based on the Combination Mode of Walsh Function

Article Preview

Abstract:

To analyses networks, technologies of network protocol analysis are usually used. A new approach of protocols analysis is presented based on the combination mode of walsh function. It consists of three parts, such as the protocol structure characterization method, the hierarchical protocol analysis and the self-learning combination modes. After discussing the analysis process, an experiment shows the efficiency of presented approach.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3482-3485

Citation:

Online since:

March 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Wireshark User Manual, http: /man. 1upaworld. com/content/network/wireshark.

Google Scholar

[2] X. Long. Design and Implementation of Network Protocol Analysis System. Computer Programming Skills & Maintenance. (2009), 8: 74-76.

Google Scholar

[3] C. Liang, G. Jian, Xu Xuan; Application-Level Protocol Identification Algorithm . Computer Science. (2007), 3 (7) : 73 -75.

Google Scholar

[4] C. Shuhui, S. Jinshu; Protocol Identification Research Based on Content Analysis. Journal of National University of Defense Technology, (2008), 30 (4) : 82- 87.

Google Scholar

[5] F. Huiping, X. Lei, C. Shuhui, et al. Application-Layer Protocol Identification Based on Regular Expressions. Computer Research and Development, (2008), 45: 438-443.

Google Scholar

[6] L. Xiongwei, Z. Qiang, X. Kaiquan. Study on Protocol Identification Algorithm Based on Decision Tree. Microcomputer Information, (2009), 25 (9-3) : 25-26.

Google Scholar

[7] S. Meihong, Y. Weiwei, L. Yonggang. Ethereal-based CORBA Communication Protocol Parsing Function. Computer Engineering and Design, (2005), 26 (12) : 3236 -3239.

Google Scholar

[8] S. Owen, P. Brereton, D. Budgen. Protocol analysis:A neglected practice. Communications of the ACM. (2006), 49(2): 117-122.

DOI: 10.1145/1113034.1113039

Google Scholar

[9] T. Abbes, A. Bouhoula, M. Rusinowiteh. Protocol Analysis in Intrusion Detection Using Decision Tree. Proceedings of the International Conference on Information Technology: Coding and Computing. USA, (2004), 1253-1261.

DOI: 10.1109/itcc.2004.1286488

Google Scholar

[10] W. Jinchao, L. Fei, C. Mingyu. Design and Implementation of Protocol Analysis Algorithm for Network Data Package, Computer Technology and Development, (2006). 16 (4) : 77-80.

Google Scholar

[11] F. Risso, L. Degioanni. An architecture for high performance network analysis. Proceedings of the Sixth IEEE Symposium on Computers and Communications. (2001), 686-693. 2001, 686-693.

DOI: 10.1109/iscc.2001.935450

Google Scholar