首页 | 本学科首页   官方微博 | 高级检索  
     检索      

文法推断网络协议状态机*
引用本文:肖明明,余顺争,张世龙.文法推断网络协议状态机*[J].科学技术与工程,2014,14(19).
作者姓名:肖明明  余顺争  张世龙
作者单位:仲恺农业工程学院,中山大学信息科学与技术学院,仲恺农业工程学院
基金项目:国家高技术研究发展计划“863”基金资助项目(No. 2007AA01Z449)、国家自然科学基金-广东联合基金重点项目(U0735002)、 国家自然科学基金项目(60970146,61202271)、广东省自然科学基金项目(S2012010009976)、广东省科技计划项目(2011B040200074)、湛江市科技攻关计划项目(2011C3105001)
摘    要:针对现有正则的正负推断(regular positive and negative inference,RPNI)算法的局限性,提出一种通过标记前缀树接受器中的状态,以差异化的状态标记方法防止状态的过度融合改进的算法——改进的RPNI算法(improved RPNI,IRPNI)。该算法从网络数据流量中导出协议规范,并将该规范表示为确定性有限自动机(definite finite automata,DFA)模型;根据网路协议特性,把启发式的差异化的状态标记算法嵌入该算法中,使得状态融合结果体现网络协议的结构特征。实验证明IRPNI算法更有助于推断出更一般化的网络协议状态机。

关 键 词:协议逆向工程  协议状态机推断  协议分析  文法推断  网络安全
收稿时间:2014/1/21 0:00:00
修稿时间:6/5/2014 12:00:00 AM

Protocol State Machine Derived Reversely Using Grammatical Inference
Xiao Mingming,Yu Shunzheng and Zhang Shi-long.Protocol State Machine Derived Reversely Using Grammatical Inference[J].Science Technology and Engineering,2014,14(19).
Authors:Xiao Mingming  Yu Shunzheng and Zhang Shi-long
Institution:School of Information Science and Technology, Sun Yat-sen University,School of Information Science and Technology, Zhongkai University of Agriculture and Engineering
Abstract:To deeply understand procedures of various network applications, and to automatically classify, recognize, trace and control them, protocol state machine that represent the application sessions have to be obtained in advance. A novel approach is presented to reversely infer protocol state machine from collected application layer data. The proposals presented consist in the modification of RPNI algorithm by means of introducing heuristics about network feature that label merging states from the prefix tree acceptor to prevent state from merging excessively. Preliminary experiments done seem to show that the improvement over the original RPNI algorithm is more helpful for deriving the more general network protocol automaton.
Keywords:protocol reverse engineering  protocol state machine inference  protocol analysis  grammatical inference  network security
本文献已被 CNKI 等数据库收录!
点击此处可从《科学技术与工程》浏览原始摘要信息
点击此处可从《科学技术与工程》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号