원문정보
보안공학연구지원센터(IJHIT)
International Journal of Hybrid Information Technology
Vol.6 No.3
2013.05
pp.55-64
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
This paper presents a set of programme to extract the application-layer protocol features. Based on frequent itemsets mining, the program automatically extracts four most common features of a protocol: characteristic string, session tag, packet length, and packet order. It is experimentally demonstrated that this progran can significantly improve the efficiency of feature extraction, and can be extended to other areas such as intrusion detection and extracting worm signature.
목차
Abstract
1. Introduction
2. The Method of Protocol Feature Extraction
2.1. Processing Training Trace
2.2. Four Characteristics of Protocols
2.3. Frequent Itemsets Mining Algorithm
2.4. Improvement of Apriori Algorithm
2.5. Mining Process Based on Shell-control
2.6. Output Signature Files
3. Authentication protocol characteristics
4. Test Results
5. Conclusions
Acknowledgements
References
1. Introduction
2. The Method of Protocol Feature Extraction
2.1. Processing Training Trace
2.2. Four Characteristics of Protocols
2.3. Frequent Itemsets Mining Algorithm
2.4. Improvement of Apriori Algorithm
2.5. Mining Process Based on Shell-control
2.6. Output Signature Files
3. Authentication protocol characteristics
4. Test Results
5. Conclusions
Acknowledgements
References
저자정보
참고문헌
자료제공 : 네이버학술정보
