Intelligent protocol parsing method and device
A protocol analysis and protocol analysis technology, applied in the field of communication control/processing, can solve the problems of the difficulty of accurate analysis of the protocol, the error of in-depth analysis of the protocol, and the inability to match, so as to achieve the effect of strong method versatility, improved accuracy and high accuracy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0048] Embodiment 1 (BitTorrent protocol static feature):
[0049] %13BitTorrent%20Protocol can identify the BitTorrent protocol or the BitTorrent message type in the software communication process using the BitTorrent protocol, which can be used as a static identification rule for the BitTorrent protocol;
[0050] Create BITTORRENT protocol static identification rule set:
[0051] The text must contain the string "Bittorrent";
[0052] etc., as the actual packet sample is:
[0053] GET / announce? info_hash=%0D%40_%F3%0A%269%81%94%B9 / %B80%5EC%8A%8
[0054] A%9A%9C%E5&peer_id=Plus---tL315oWGtwZ9o&port=9096&uploaded=0&dow
[0055] nloaded=0&left=28742712&event=started HTTP / 1.0..Host: btfans.332
[0056] 2.org:8000..Accept-encoding:gzip..User-agent:BitTorrent / Plus!
[0057] II 1.02 RC1....
[0058] However, it is difficult to judge the specific software or version in some cases. For example, if an IP packet is found to carry the protocol static feature "HTTP", it is very l...
Embodiment 2
[0059] Embodiment 2 (BitTorrent protocol behavior characteristics):
[0060] First use the track HTTP protocol to interact with the tracker server:
[0061] 1) The client sends an HTTP GET request to the tracker
[0062] The feature of this step is: GET / announce....HTTP / 1.0 sends a GET request to Tracker, including the keyword Bittorent:
[0063] 2) The tracker returns the information of the downloader of the same file to the other party. The feature of this step is: the address and port of the dictionary list Peers encoded with bencoded.
[0064] 3) The BitTorrent client sends a connection request according to the obtained peer list. The feature of this step is: the connection request for each peer includes the keyword "BitTorrent".
[0065] Protocol feature extraction; feature extraction is mainly divided into two steps, the first is static feature extraction of protocol data packets. This part mainly relies on a single data packet to make a preliminary judgment on the p...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com