Computer and Modernization

Previous Articles    

 Network Protocol Dactylogram Identification Based on Content Analysis

  

  1.   (1. State Grid Ningxia Electric Power Company, Ningxia 750001, China;
      2. Beijing China Power Information Technology Co. Ltd., Beijing 100085, China)
  • Received:2017-11-28 Online:2018-06-13 Published:2018-06-13

Abstract: In view of the challenge of the increasing network bandwidth of current network protocol recognition, the emerging of the new application and the limit of the port recognition, the basis, limitation and difficulty of matching fingerprints used in various identification methods are analyzed. A protocol self-identification method based on protocol fingerprint matching and protocol rule authentication is proposed to realize the protocol self-identification method. By extracting slight difference between various network protocols, the special network protocol fingerprint database is formed, and the protocol authentication rule is used to verify the correctness of the protocol identification results. The validity of the method is verified by experiments.

Key words: network protocol identification, protocol fingerprint identification, regular expression, protocol validation rules

CLC Number: