{"title":"基于消息概率分布分析的协议逆向工程","authors":"Wu Weisen, Gu Chunxiang","doi":"10.1109/icceic51584.2020.00022","DOIUrl":null,"url":null,"abstract":"The protocol reverse engineering is becoming more and more important because of the unknown protocols. This study proposes a protocol reverse method, based on the network traffic, which uses the probability distribution relationship between the fields to analyze the field boundaries. The experimental results show that the algorithm is better than Netzob in running results and time.","PeriodicalId":135840,"journal":{"name":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Protocol Reverse Engineering by Analysis of the Probability Distribution of Messages\",\"authors\":\"Wu Weisen, Gu Chunxiang\",\"doi\":\"10.1109/icceic51584.2020.00022\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The protocol reverse engineering is becoming more and more important because of the unknown protocols. This study proposes a protocol reverse method, based on the network traffic, which uses the probability distribution relationship between the fields to analyze the field boundaries. The experimental results show that the algorithm is better than Netzob in running results and time.\",\"PeriodicalId\":135840,\"journal\":{\"name\":\"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)\",\"volume\":\"49 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/icceic51584.2020.00022\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on Computer Engineering and Intelligent Control (ICCEIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/icceic51584.2020.00022","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Protocol Reverse Engineering by Analysis of the Probability Distribution of Messages
The protocol reverse engineering is becoming more and more important because of the unknown protocols. This study proposes a protocol reverse method, based on the network traffic, which uses the probability distribution relationship between the fields to analyze the field boundaries. The experimental results show that the algorithm is better than Netzob in running results and time.