[1]
Wireshark User Manual, http: /man. 1upaworld. com/content/network/wireshark.
Google Scholar
[2]
X. Long. Design and Implementation of Network Protocol Analysis System. Computer Programming Skills & Maintenance. (2009), 8: 74-76.
Google Scholar
[3]
C. Liang, G. Jian, Xu Xuan; Application-Level Protocol Identification Algorithm . Computer Science. (2007), 3 (7) : 73 -75.
Google Scholar
[4]
C. Shuhui, S. Jinshu; Protocol Identification Research Based on Content Analysis. Journal of National University of Defense Technology, (2008), 30 (4) : 82- 87.
Google Scholar
[5]
F. Huiping, X. Lei, C. Shuhui, et al. Application-Layer Protocol Identification Based on Regular Expressions. Computer Research and Development, (2008), 45: 438-443.
Google Scholar
[6]
L. Xiongwei, Z. Qiang, X. Kaiquan. Study on Protocol Identification Algorithm Based on Decision Tree. Microcomputer Information, (2009), 25 (9-3) : 25-26.
Google Scholar
[7]
S. Meihong, Y. Weiwei, L. Yonggang. Ethereal-based CORBA Communication Protocol Parsing Function. Computer Engineering and Design, (2005), 26 (12) : 3236 -3239.
Google Scholar
[8]
S. Owen, P. Brereton, D. Budgen. Protocol analysis:A neglected practice. Communications of the ACM. (2006), 49(2): 117-122.
DOI: 10.1145/1113034.1113039
Google Scholar
[9]
T. Abbes, A. Bouhoula, M. Rusinowiteh. Protocol Analysis in Intrusion Detection Using Decision Tree. Proceedings of the International Conference on Information Technology: Coding and Computing. USA, (2004), 1253-1261.
DOI: 10.1109/itcc.2004.1286488
Google Scholar
[10]
W. Jinchao, L. Fei, C. Mingyu. Design and Implementation of Protocol Analysis Algorithm for Network Data Package, Computer Technology and Development, (2006). 16 (4) : 77-80.
Google Scholar
[11]
F. Risso, L. Degioanni. An architecture for high performance network analysis. Proceedings of the Sixth IEEE Symposium on Computers and Communications. (2001), 686-693. 2001, 686-693.
DOI: 10.1109/iscc.2001.935450
Google Scholar