Intelligent protocol parsing method and device
A technology of protocol analysis and intelligent analysis, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as protocol in-depth analysis errors, difficulty in accurate protocol analysis, and inability to match, so as to improve accuracy and strong versatility of the method , the effect of high accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0051] Embodiment 1 (Static Features of BitTorrent Protocol):
[0052] %13BitTorrent%20Protocol can identify the BitTorrent message type in the BitTorrent protocol or software communication process that uses the BitTorrent protocol, and it can be used as the BitTorrent protocol static identification rule;
[0053] Establish the BITTORRENT protocol static identification rule set:
[0054] The text must contain the string "Bittorrent";
[0055] And so on, if the actual data packet sample is:
[0056] GET / announce? info_hash=%OD%40_%F3%0A%269%81%94%B9 / %B80%5EC%8A%8
[0057] A%9A%9C%E5&peer_id=Plus---tL3l5oWGtwZ9o&port=9096&uploaded=0&dow
[0058] nloaded=0&left=28742712&event=started HTTP / 1.0..Host:btfans.332
[0059] 2.org: 8000.. Accept-encoding: gzip.. User-agent: BitTorrent / Plus!
[0060] II 1.02 RC1....
[0061] However, in some cases, it is difficult to judge the specific software or version. For example, if an IP packet is found to carry the protocol static feature "HTTP", it ...
Example Embodiment
[0062] Embodiment 2 (BitTorrent protocol behavior characteristics):
[0063] First use the track HTTP protocol that interacts with the tracker server:
[0064] 1) The client sends an HTTP GET request to the tracker
[0065] The feature of this step is: GET / announce...the GET request sent to Tracker by HTTP / 1.0, including the keyword Bittorent:
[0066] 2) The tracker returns the information of the downloader of the same file to the other party. The feature of this step is: the Peers address and port of the dictionary list encoded by bencoded.
[0067] 3) The BitTorrent client sends a connection request according to the obtained peer list. The feature of this step is that the "BitTorrent" keyword is included in the connection request of each peer.
[0068] Protocol feature extraction: The feature extraction is mainly divided into two steps, the first is the static feature extraction of protocol packets. This part mainly relies on a single data packet to make preliminary judgments o...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap