[1]LI Xiangdong,CHEN Li.A survey on methods of automatic protocol reverse engineering[C]//Proceedings of the 7th International Conference on Computational Intelligence and Security.Washington D.C.,USA:IEEE Press,2011:685-689.
[2]NARAYAN J,SHUKLA S K,CLANCY T C.A survey of automatic protocol reverse engineering tools[J].ACM Computing Surveys,2015,48(3):1-26.
[3]潘璠,吴礼发,杜有翔,等.协议逆向工程研究进展[J].计算机应用研究,2011,28(8):2801-2806.
[4]BEDDOE M.The protocol informatics project[EB/OL].[2018-03-04].http://www.4tphi.net/~awalters/PI/PI.html.
[5]CUI Weidong,KANNAN J.Discoverer:automatic protocol reverse engineering from network traces[C]//Proceedings of the 16th USENIX Security Symposium.Berkeley,USA:USENIX Association,2007:14-17.
[6]COHEN P,ADAMS N,HEERINGA B.Voting experts:an unsupervised algorithm for segmenting sequences[J].Intelligent Data Analysis,2007,11(6):607-625.
[7]KRUEGER T,KRMER N,RIECK K.ASAP:automatic semantics-aware analysis of network payloads[C]//Proceedings of International Workshop on Privacy and Security Issues in Data Mining and Machine Learning.Berlin,Germany:Springer,2010:50-63.
[8]杜有翔,吴礼发,潘璠,等.一种基于报文序列分析的半自动协议逆向方法[J].计算机工程,2012,38(19):277-280.
[9]WANG Yipeng,LI Xingjian,MENG Jiao,et al.Biprominer:automatic mining of binary protocol features[C]//Proceedings of the 12th International Conference on Parallel and Distributed Computing,Applications and Technologies.Washington D.C.,USA:IEEE Press,2011:179-184.
[10]WANG Yipeng,YUN Xiaochun,SHAFIQ M Z.A semantics aware approach to automated reverse engineering unknown protocols[C]//Proceedings of the 20th IEEE International Conference on Network Protocols.Washington D.C.,USA:IEEE Press,2012:1-10.
[11]LUO Jianzhen,YU Shunzheng.Position-based automatic reverse engineering of network protocols[J].Journal of Network and Computer Applications,2013,36(3):1070-1077.
[12]WHALEN S,BISHOP M,CRUTCHFIELD J P.Hidden Markov models for automated protocol learning[C]//Proceedings of SECURECOMM’10.Berlin,Germany:Springer,2010:415-428.
[13]CAI Jun,LUO Jianzhen,LEI Fangyuan.Analyzing network protocols of application layer using hidden semi-Markov model[EB/OL].(2016-04-18)[2018-03-04].http://dx.doi.org/10.1155/2016/9161723.
[14]AGRAWAL R,SRIKANT R.Fast algorithms for mining association rules[C]//Proceedings of the 20th International Conference on VLDB.New York,USA:ACM Press,1994:487-499.
[15]RABINER L,JUANG B.An introduction to hidden Markov models[EB/OL].[2018-03-04].http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.331.8847&rep=rep1&type=pdf.
[16]YU Shunzheng.Hidden semi-Markov models[J].Artificial Intelligence,2010,174(2):215-243.
[17]王召.基于数据库审计系统 TNS 协议解析的研究与实现[D].北京:华北电力大学,2015.
[18]徐有为.基于TNS协议的Oracle审计网关系统的设计与实现[D].北京:中国科学院大学,2014.
[19]Oracle TNS协议分析[EB/OL].[2018-03-04].https://wenku.baidu.com/view/0ba5df6925c52cc58bd6bedc.html. |