Li Fen, Li Tong, Zhang Chun-rui, Wang Yong, Song Jiang
{"title":"未知数据帧长度标识","authors":"Li Fen, Li Tong, Zhang Chun-rui, Wang Yong, Song Jiang","doi":"10.1109/CIS.2012.155","DOIUrl":null,"url":null,"abstract":"Unknown protocol identification is widely used in the field of network and information security. Most previous researches focus on known protocol identification and analysis of network layer and above. However, the research on unknown protocol is an essential part for ensuring the safety of information system. In this work, a length identification method of unknown data frame is proposed based on characteristic searching of bit stream of unknown protocol, which can analyzes and researches protocols unknown from physical layer to application layer and determines the length of frame effectively. This method can adapt to the identification of unknown communication protocol and is significant to network and information security.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Length Identification of Unknown Data Frame\",\"authors\":\"Li Fen, Li Tong, Zhang Chun-rui, Wang Yong, Song Jiang\",\"doi\":\"10.1109/CIS.2012.155\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Unknown protocol identification is widely used in the field of network and information security. Most previous researches focus on known protocol identification and analysis of network layer and above. However, the research on unknown protocol is an essential part for ensuring the safety of information system. In this work, a length identification method of unknown data frame is proposed based on characteristic searching of bit stream of unknown protocol, which can analyzes and researches protocols unknown from physical layer to application layer and determines the length of frame effectively. This method can adapt to the identification of unknown communication protocol and is significant to network and information security.\",\"PeriodicalId\":294394,\"journal\":{\"name\":\"2012 Eighth International Conference on Computational Intelligence and Security\",\"volume\":\"69 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Eighth International Conference on Computational Intelligence and Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIS.2012.155\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Eighth International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2012.155","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Unknown protocol identification is widely used in the field of network and information security. Most previous researches focus on known protocol identification and analysis of network layer and above. However, the research on unknown protocol is an essential part for ensuring the safety of information system. In this work, a length identification method of unknown data frame is proposed based on characteristic searching of bit stream of unknown protocol, which can analyzes and researches protocols unknown from physical layer to application layer and determines the length of frame effectively. This method can adapt to the identification of unknown communication protocol and is significant to network and information security.