Automated reverse network protocol analysis method

A technology of reverse analysis and network protocol, applied in the field of network communication, can solve the problems of time-consuming and manpower, and achieve the effect of making up for negligence and deficiencies and saving manpower and time

Active Publication Date: 2014-04-09
TSINGHUA UNIV
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the increasing complexity of existing network protocols, the protection of protocols and application software itse...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automated reverse network protocol analysis method
  • Automated reverse network protocol analysis method
  • Automated reverse network protocol analysis method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0049] The network protocol automatic reverse analysis method of the present invention is mainly divided into three stages: C / S (Client, software client / Server, server) terminal program communication information extraction, dynamic protocol tracking analysis and log file analysis three processes , which includes the following steps:

[0050] s1. Static communication information extraction:

[0051] Extract the key information from the information loaded by the monitoring software communication at the C / S end and save it to the log file;

[0052] s2. Dynamic protocol tracking analysis:

[0053] Breakpoints are set according to the key information, and by breakpoint analy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network communication and particularly relates to an automated reverse network protocol analysis method. The automated reverse network protocol analysis method comprises the following steps: S1, static communication information extraction: extracting key information among information loaded in communication of C/S-end monitored software and saving the key information to a log file; S2, dynamic protocol tracking and analysis: setting a breakpoint according to the key information and capturing log information related to packet transmitting and receiving functions of the monitored software through breakpoint analysis, analyzing the construction and parsing process of a network protocol packet of the C/S-end monitored software and saving an obtained result to the log file; and S3, information analysis: analyzing and organizing the log file to obtain a needed reverse analysis result. Through fully-automated reverse network protocol analysis, a target application can be completely analyzed and cracked, manpower and time are saved, and negligence and deficiency of artificial reverse analysis are compensated.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to an automatic reverse analysis method of a network protocol. Background technique [0002] With the wide application of the Internet in the world, the political, military, economic, social and other aspects of various countries are increasingly inseparable from computer networks. However, due to the fragility of network security, hacker attacks on the network are also increasing rapidly. As various network applications become more and more abundant, network penetration tools, unauthorized access, information theft, data destruction, denial of server attacks, spreading viruses and other means of network intrusion and destruction are becoming more and more advanced. Hackers often destroy and attack other people's systems to steal information through protocol loopholes, and use penetrating tools and anonymous communication tools to spread illegal information such as Tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 薛一波王兆国李城龙
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products