Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    Unsupervised Binary Protocol Clustering Based on Maximum Sequential Patterns

    Jiaxin Shi1, Lin Ye1,2,*, Zhongwei Li3, Dongyang Zhan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.130, No.1, pp. 483-498, 2022, DOI:10.32604/cmes.2022.017467 - 29 November 2021

    Abstract With the rapid development of the Internet, a large number of private protocols emerge on the network. However, some of them are constructed by attackers to avoid being analyzed, posing a threat to computer network security. The blockchain uses the P2P protocol to implement various functions across the network. Furthermore, the P2P protocol format of blockchain may differ from the standard format specification, which leads to sniffing tools such as Wireshark and Fiddler not being able to recognize them. Therefore, the ability to distinguish different types of unknown network protocols is vital for network security.… More >

Displaying 1-10 on page 1 of 1. Per Page