Li Tong, Liu Yuan, Chun-rui Zhang, Fanzhi Meng, Yue Yang
{"title":"A novel method for delimiting frames of unknown protocol","authors":"Li Tong, Liu Yuan, Chun-rui Zhang, Fanzhi Meng, Yue Yang","doi":"10.1109/IWECA.2014.6845680","DOIUrl":null,"url":null,"abstract":"Protocol reverse from network traces is widely used in the field of network security. But most of the studies focuse on application-level unknown protocols in Ethernet network system. However, in some special wireless systems, the protocol stack is proprietary. It is in urgent need to do the study on the unknown protocol stack. This paper proposed a new method to delimit frames in the bit stream which generated by signal process. By fully exploiting the characteristics of the wireless protocol data, two levels of frequent items mining are employed and a comprehensive index is applied to recognize the preamble. In the experiment, the method is indicated effective.","PeriodicalId":383024,"journal":{"name":"2014 IEEE Workshop on Electronics, Computer and Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE Workshop on Electronics, Computer and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWECA.2014.6845680","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Protocol reverse from network traces is widely used in the field of network security. But most of the studies focuse on application-level unknown protocols in Ethernet network system. However, in some special wireless systems, the protocol stack is proprietary. It is in urgent need to do the study on the unknown protocol stack. This paper proposed a new method to delimit frames in the bit stream which generated by signal process. By fully exploiting the characteristics of the wireless protocol data, two levels of frequent items mining are employed and a comprehensive index is applied to recognize the preamble. In the experiment, the method is indicated effective.