[1] ZHU J,GUO C,WU Q. Conformance checking method for Web service interaction behaviors based on Petri nets[J]. Computer Engineering and Science, 2013,35(1):24-25.(朱俊,郭长国,吴泉源.基于Petri网的Web服务交互行为一致性检测方法[J]. 计算机工程与科学,2013,35(1):24-25.) [2] HOOPER E, HOLLOWAY R. Intelligent techniques for effective network protocol security monitoring, measurement and prediction[J]. International Journal of Security and Its Applications,2008, 2(4): 1-10. [3] PAN F, WU L, DU Y, et al. Overviews on protocol reverse engineering[J]. Application Research of Computers, 2011,28(8):2801-2806.(潘璠,吴礼发,杜有翔,等. 协议逆向工程研究进展[J].计算机应用研究,2011,28(8):2801-2806.) [4] DAINOTTI A, PESCAPÉA, CLAFFY K C. Issues and future directions in traffic classification[J]. IEEE Network, 2012, 26(1):35-40. [5] ZHANG Z, WEN Q, TANG W. Survey of mining protocol specifications[J]. Computer Engineering and Applications,2013, 49(9):1-9.(张钊,温巧燕,唐文. 协议规范挖掘研究综述[J].计算机工程与应用, 2013,49(9):1-9.) [6] LI X, LI C. A survey on methods of automatic protocol reverse engineering[C]// Proceedings of the 7th International Conference on Computational Intelligence and Security. Piscataway: IEEE, 2011: 685-689. [7] WANG Y, ZHANG Z, YAO D, et al. Inferring protocol state machine from network traces: a probabilistic approach[C]// Proceedings of the 2011 International Conference on Applied Cryptography and Network Security. Berlin: Springer, 2011: 1-18. [8] ITU-T. Message sequence chart (MSC)[S]. Geneva: ITU-Telecommunication Standardization Sector, 1999. [9] DONG G, PEI J. Mining partial orders from sequences[J]. Sequence Data Mining, 2007, 33(10): 89-112. [10] WANG Y, YUN X, SHAFIQ M Z, et al. A semantics aware approach to automated reverse engineering unknown protocols[C]// Proceedings of the 20th IEEE International Conference on Network Protocols. Piscataway: IEEE, 2012:1-10. [11] HUANG X, CHEN X, ZHU N, et al. Protocol state machine reverse method based on labeling state[J]. Journal of Computer Applications, 2013, 33(12): 3486-3489.(黄笑言,陈性元,祝宁,等. 基于状态标注的协议状态机逆向方法[J].计算机应用, 2013, 33(12): 3486-3489.) [12] LI N. Application protocol identification based on flow statistics[D]. Nanjing: Nanjing University of Posts and Telecommunications, 2013:10-11.(李宁. 基于流统计特性的应用协议识别技术研究[D]. 南京:南京邮电大学, 2013:10-11.) [13] ANTUNES J, NEVES N, VERISSIMO P. Reverse engineering of protocols from network traces[C]// Proceedings of the 18th Working Conference on Reverse Engineering. Piscataway: IEEE, 2011: 17-20. |