首页 | 本学科首页   官方微博 | 高级检索  
     

基于内容分析的网络协议指纹识别
引用本文:夏 琨,丁 波,刘 俊,刘子豪,林亮成.基于内容分析的网络协议指纹识别[J].计算机与现代化,2018,0(5):121.
作者姓名:夏 琨  丁 波  刘 俊  刘子豪  林亮成
摘    要:针对当前网络协议识别面临的网络带宽持续增加、许多新应用的出现和端口识别局限性的挑战,分析各种识别方法所使用的协议指纹存在的基础、局限性和匹配的难易程度,提出一种基于协议指纹匹配和协议规则验证的协议自识别技术实现协议自识别方法,通过提取不同网络协议类型之间的细微差别,建立网络应用协议指纹特征库,并通过协议验证规则验证协议识别结果的正确性。最后通过实验表明该方法的有效性。

关 键 词:   网络协议识别    协议指纹识别    正则表达式    协议验证规则  
收稿时间:2018-06-13

Network Protocol Dactylogram Identification Based on Content Analysis
XIA Kun,DING Bo,LIU Jun,LIU Zi-hao,LIN Liang-cheng.Network Protocol Dactylogram Identification Based on Content Analysis[J].Computer and Modernization,2018,0(5):121.
Authors:XIA Kun  DING Bo  LIU Jun  LIU Zi-hao  LIN Liang-cheng
Abstract:In view of the challenge of the increasing network bandwidth of current network protocol recognition, the emerging of the new application and the limit of the port recognition, the basis, limitation and difficulty of matching fingerprints used in various identification methods are analyzed. A protocol self-identification method based on protocol fingerprint matching and protocol rule authentication is proposed to realize the protocol self-identification method. By extracting slight difference between various network protocols, the special network protocol fingerprint database is formed, and the protocol authentication rule is used to verify the correctness of the protocol identification results. The validity of the method is verified by experiments.
Keywords:network protocol identification  protocol fingerprint identification  regular expression  protocol validation rules  
点击此处可从《计算机与现代化》浏览原始摘要信息
点击此处可从《计算机与现代化》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号