A method and system for network application layer protocol identification
A protocol identification and network application technology, applied in the Internet field, can solve problems such as unsatisfactory accuracy rate, slow identification speed, poor encryption protocol identification effect, etc., and achieve fast and accurate identification effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0049] figure 1 It is a flow chart of the method for network application layer protocol identification provided by this embodiment, see figure 1 , the method for network application layer protocol identification includes:
[0050] Step S1: Acquiring feature information of the communication process, said feature information including at least one of the following or a combination thereof: IP address of the communication process, main feature code, protocol port, length of data packets in the communication process;
[0051] Step S2: According to any hash table in the preset IP address hash table, main feature code hash table, protocol port hash table and data packet length hash table, or a preset identification plug-in for the The communication process is identified, and if the communication process is identified, the protocol ID of the communication process is obtained; otherwise, the protocol of the communication process is marked as undefined.
[0052] It should be noted th...
Embodiment 2
[0058] On the basis of Embodiment 1, the method for network application layer protocol identification provided by this embodiment also includes before step S1:
[0059] Obtain an IP address of a known communication process, perform a hash operation on the IP address to obtain a first initial hash value, and associate and store the first initial hash value and the protocol ID of the known communication process corresponding to the IP address to generate the IP address hash table;
[0060] Obtain the main feature code of the known communication process, perform a hash operation on the main feature code to obtain the second initial hash value, and store the second initial hash value and the protocol ID of the known communication process corresponding to the main feature code to generate the main feature code. signature hash table;
[0061] Obtain the protocol port of the known communication process, perform a hash operation on the protocol port to obtain the third initial hash v...
Embodiment 3
[0101] figure 2 It is a flow chart of the method for network application layer protocol identification provided by this embodiment, see figure 2 , on the basis of embodiment 2, said step S2 includes:
[0102] S21: Identify the communication process according to the IP address hash table, if the communication process is identified, obtain the protocol ID of the communication process, otherwise, enter step S22;
[0103] S22: Identify the communication process according to the main feature code hash table, if the communication process is identified, obtain the protocol ID of the communication process, otherwise, enter step S23;
[0104] S23: Identify the communication process according to the protocol port hash table, if the communication process is identified, obtain the protocol ID of the communication process, otherwise, enter step S24;
[0105] S24: Identify the communication process according to the length hash table of the data packet, if the communication process is id...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



