首页 | 本学科首页   官方微博 | 高级检索  
     

基于逆向分析的P2P加密协议识别方案
引用本文:王晶,姜珊.基于逆向分析的P2P加密协议识别方案[J].电视技术,2014,38(19).
作者姓名:王晶  姜珊
作者单位:中国石油大学(北京)电子工程系,北京,102249
摘    要:针对加密协议识别的难题,提出了一种基于逆向分析的协议识别方案,该方案在程序层面进行逆向分析解析出其通信过程和协议结构,在逆向分析的基础上结合流量特征对其进行识别。最后以当下最典型的Thunder为例进行试验,结果验证了方案的有效性,并能扩展到其他加密协议。该方案能够实时、准确地识别加密协议,从而能够更好地进行流量控制。

关 键 词:PP加密协议  逆向分析  协议识别  Thunder
收稿时间:2014/2/26 0:00:00
修稿时间:4/2/2014 12:00:00 AM

The identification scheme of P2P encryption protocol based on reverse analysis
wangjing and jiangshan.The identification scheme of P2P encryption protocol based on reverse analysis[J].Tv Engineering,2014,38(19).
Authors:wangjing and jiangshan
Affiliation:China Univwesity of Petorleum,China Univwesity of Petorleum
Abstract:With the development of P2P technology, more and more P2P private protocols uses encryption technology, the traditional protocol identification method has been a failure. Aiming at the problem , the paper proposes a protocol identification scheme based on reverse analysis, the scheme analyze the communication process and protocol structure in program level, and combine the characteristics of flow for identification. At last,take Thunder for test, the results demonstrate the effectiveness of the proposed method, and can be extended to other encryption protocosl. The scheme can identify the encryption protocol real-time and accuratly, and control the flow better.
Keywords:Key words: P2P encryption procotol  reverse analysis  protocol identification  Thunder
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《电视技术》浏览原始摘要信息
点击此处可从《电视技术》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号