2016
DOI: 10.1002/cpe.3799
|View full text |Cite
|
Sign up to set email alerts
|

An association analysis and identification for unknown protocol of bitstream oriented

Abstract: SUMMARYAs for the bitstream data features in mobile wireless network, a method based on association rules was proposed to identify the unknown protocol in certain circumstances. The method improved traditional protocol identification technology to reduce its limitation by ways of port number and fixed features of known protocol. Through capturing bitstream data transmitted in wireless environment, the method extracted the feature information and also mined the association rules to identify and mark the unknown… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…There are no significant achievements in the analysis of such protocols in current studies. Zhang et al [29] only recognized the address field in the message format, and Zheng et al [30] could not identify the message types of the protocol.…”
Section: Related Workmentioning
confidence: 99%
“…There are no significant achievements in the analysis of such protocols in current studies. Zhang et al [29] only recognized the address field in the message format, and Zheng et al [30] could not identify the message types of the protocol.…”
Section: Related Workmentioning
confidence: 99%
“…introduced one such comprehensive schemes: it takes consideration of the DG's own characteristics and its ability to support the local loading, it adopts different protection strategy, and realizes the fault isolation and island division through the coordination between the protection and the automatic devices. J. Zheng extracted the feature information and also mined the association rules to identify and mark the unknown protocol using the learning mechanism of machine. The unknown protocol in a specific environment was found and analyzed by marking the fingerprint information of protocol.…”
mentioning
confidence: 99%