2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS) 2017
DOI: 10.1109/apnoms.2017.8094126
|View full text |Cite
|
Sign up to set email alerts
|

Survey on network protocol reverse engineering approaches, methods and tools

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Analyzing the role of network protocol specifications in the field of network regulation can help us to obtain information about the network traffic in the target network [21,22]. By classifying the traffic generated by these protocols, network usage can be identified, network expansion plans can be developed, and bandwidth for specific protocols can be controlled.…”
Section: Introductionmentioning
confidence: 99%
“…Analyzing the role of network protocol specifications in the field of network regulation can help us to obtain information about the network traffic in the target network [21,22]. By classifying the traffic generated by these protocols, network usage can be identified, network expansion plans can be developed, and bandwidth for specific protocols can be controlled.…”
Section: Introductionmentioning
confidence: 99%
“…As a bridge of these methods, protocol can capture the lifeblood of these illegal means.Because the means of unknown network protocol is almost 0 in the existing technology, it is urgent to analyze the unknown network protocol. According to the ITRC, so far in 2018, there have been more than 1100 data leakage incidents, 6 with a total of 561 700 000 exposure records. The global average cost of data leakage research in 2018, sponsored by the Ponemon.…”
Section: Introductionmentioning
confidence: 99%