[1] TAO S Y, YU H Y, LI Q. Bit-oriented format extraction approach for automatic binary protocol reverse engineering[J]. IET Communications, 2016, 10(6):709-716. [2] TONG L, LIU Y, ZHANG C R, et al. A noise-tolerant system for protocol formats extraction from binary data[C]//Proceedings of the 2014 IEEE Workshop on Advanced Research and Technology in Industry Applications. Piscataway, NJ:IEEE, 2014:862- 865. [3] 孟凡治,李桐,刘渊,等.基于概率比对的通信协议格式逆向分析方法[J].计算机工程与设计,2016,37(9):2337-2341.(MENG F Z, LI T, LIU Y, et al. Format reverse method for communication protocol based on probability alignment[J]. Computer Engineering and Design, 2016, 37(9):2337-2341.) [4] WANG Y P, YUN X C, SHAFIQ M Z, et al. A semantics aware approach to automated reverse engineering unknown protocols[C]//Proceedings of the 201220th IEEE International Conference on Network Protocols. Piscataway, NJ:IEEE, 2012:1-10. [5] LUO J Z, YU S Z. Position-based automatic reverse engineering of network protocols[J]. Journal of Network and Computer Applications, 2013, 36(3):1070-1077. [6] 黎敏,余顺争.抗噪的未知应用层协议报文格式最佳分段方法*[J]. 软件学报,2013,24(3):604-617.(LI M, YU S Z. Noise-tolerant and optimal segmentation of message formats for unknown application-layer protocols[J]. Journal of Software, 2013, 24(3):604-617.) [7] 吴礼发,洪征,潘璠.网络协议逆向分析及应用[M]. 北京:国防工业出版社,2016:63.(WU L F, HONG Z, PAN F. Network Protocol Reverse Analysis and Application[M]. Beijing:National Defense Industry Press, 2016:63.) [8] 王变琴,余顺争.自适应网络应用特征发现方法[J].通信学报,2013,34(4):127-137.(WANG B Q, YU S Z. Adaptive extraction method of network application signatures[J]. Journal on Communications, 2013, 34(4):127-137.) [9] 鲍琳.浅谈船载自动识别系统(AIS)[J].广船科技,2002(4):1-3.(BAO L. Brief discussion the shipborne automatic identification system[J]. GSI Shipbuilding Technology, 2002(4):1-3.) [10] MA J, LEVCHENKO K, KREIBICH C, et al. Unexpected means of protocol inference[C]//Proceedings of the 20066th ACM SIGCOMM Conference on Internet Measurement. New York:ACM, 2006:313-326. [11] BROWN P F, DESOUZA P V, MERCER R L, et al. Class-based n-gram models of natural language[J]. Computational Linguistics, 1992, 18(4):467-479. [12] 范亮,王晓梅,杨东煜.一种利用最佳路径搜索的PDU容错定界算法[J].西安电子科技大学学报(自然科学版),2016,43(5):160-166.(FAN L, WANG X M, YANG D Y. Algorithm for error-tolerant delimitation for the protocol data unit based on best path searching[J]. Journal of Xidian University (Natural Science), 2016, 43(5):160-166.) [13] POSTEL J. Internet control message protocol[EB/OL].[2017-10-16]. http://www.uni-obuda.hu/users/wuhrlt/MSC_targyak/rfc/rfc792.pdf. [14] MCLAUGHLIN L J. Standard for the transmission of IP datagrams over NetBIOS networks[EB/OL].[2017-10-16]. http://www.rfc-editor.org/in-notes/pdfrfc/rfc1088.txt.pdf. [15] TRIFILÒ A, BURSCHKA S, BIERSACK E. Traffic to protocol reverse engineering[C]//Proceedings of the Second IEEE International Conference on Computational Intelligence for Security and Sefense Applications. Piscataway, NJ:IEEE, 2009:257-264. |