Proprietary protocol analysis and identification method

A proprietary protocol and identification method technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of not being able to identify encryption protocols, and achieve high accuracy and simple effects

Active Publication Date: 2015-04-08
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF2 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Aiming at the technical problem that the protocol identification method in the prior art cannot identify the private encryption protocol, the present invention discloses a private protocol analysis and identification method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proprietary protocol analysis and identification method
  • Proprietary protocol analysis and identification method
  • Proprietary protocol analysis and identification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0028] The invention discloses a private protocol analysis and identification method, which specifically includes the following steps:

[0029]Step 1: Unpack the client software that uses a private protocol for communication to obtain the unpacked original program; then disassemble the original program to obtain the assembly code of the original program; and then disassemble the original program in the assembly code The key functions are dynamically debugged to obtain the field length and structural characteristics of the message type of the private protocol; the key functions include: 1. The constructor of the message data packet; 2. The function of sending and receiving the message data packet; 3. . Encryption and decryption functions. For the analysis of the encryption protocol, this step is a method to obtain the division a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of protocol communication, and discloses a proprietary protocol analysis and identification method. The method comprises the following specific steps: I, performing shelling processing on communication client software by adopting a proprietary protocol; disassembling an original program; and dynamically debugging a key function in an assembly code; II, fetching the network flow data of the proprietary protocol, performing message data packet classification according to different stages of protocol interaction, and resolving the field structure of each type of message data packet respectively; III, extracting and inducing protocol characteristics in an interaction process, wherein the protocol characteristics comprise interaction process information and the field structure characteristics of the message data packets; and IV, setting a matching expression of protocol identification by using the protocol characteristics obtained in the step III, and identifying flow acquired in a network. Through the method, the analysis and identification of the proprietary protocol are realized.

Description

technical field [0001] The invention relates to the technical field of protocol communication, in particular to a private protocol analysis and identification method. Background technique [0002] Protocol specification is a necessary condition for network communication, and it is also the basis of network security technology and network supervision. Key technologies such as fuzzy testing, vulnerability mining, intrusion detection, protocol reuse, and traffic auditing all rely on the detailed description information of the protocol. Currently, the Internet carries more and more new applications such as P2P, VoiP, IPTV, streaming media, online games, and file sharing, and most of the network protocols they use are undisclosed. People have carried out analysis and identification research on these private protocols. The purpose of the analysis is to recover the message format and interaction process of the protocol specification, and further use the obtained protocol characteri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L43/18H04L69/03
Inventor 张李军吉庆兵于飞兰天陈曼刘丹罗杰
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products