Jiaxin Shi1, Lin Ye1,2,*, Zhongwei Li3, Dongyang Zhan1
CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 483-498, 2022, DOI:10.32604/cmes.2022.017467
- 29 November 2021
Abstract With the rapid development of the Internet, a large number of private protocols emerge on the network. However, some of them are constructed by attackers to avoid being analyzed, posing a threat to computer network security. The blockchain uses the P2P protocol to implement various functions across the network. Furthermore, the P2P protocol format of blockchain may differ from the standard format specification, which leads to sniffing tools such as Wireshark and Fiddler not being able to recognize them. Therefore, the ability to distinguish different types of unknown network protocols is vital for network security.… More >