CN101710898B - Method for describing characteristics of communication protocol of application software - Google Patents

Method for describing characteristics of communication protocol of application software Download PDF

Info

Publication number
CN101710898B
CN101710898B CN2009102374338A CN200910237433A CN101710898B CN 101710898 B CN101710898 B CN 101710898B CN 2009102374338 A CN2009102374338 A CN 2009102374338A CN 200910237433 A CN200910237433 A CN 200910237433A CN 101710898 B CN101710898 B CN 101710898B
Authority
CN
China
Prior art keywords
characteristic item
load
item
characteristic
feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009102374338A
Other languages
Chinese (zh)
Other versions
CN101710898A (en
Inventor
胡昌振
姚淑萍
薛飞
张欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Institute of Technology BIT
Original Assignee
Beijing Institute of Technology BIT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Institute of Technology BIT filed Critical Beijing Institute of Technology BIT
Priority to CN2009102374338A priority Critical patent/CN101710898B/en
Publication of CN101710898A publication Critical patent/CN101710898A/en
Application granted granted Critical
Publication of CN101710898B publication Critical patent/CN101710898B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Communication Control (AREA)

Abstract

The invention relates to a method for describing characteristics of a communication protocol of application software, and belongs to the technical field of information and network security. The premise of using the method is that the characteristics of the communication protocol of the application software required to be identified have been acquired in a network data packet through analysis; and then the method provided by the invention is used to describe the characteristics of the communication protocol of the application software so as to accurately identify the communication protocol of the application software. The characteristics of the communication protocol of the application software are definitely classified and defined, and the method has the characteristics of strict logic, compact structure, wide application range, good expandability and the like. When the method is used for identifying the characteristics of the communication protocol of the application software, the method has the advantages to high efficiency, accuracy, real time, expandability and the like.

Description

A kind of method that is used to discern characteristics of communication protocol of application software
Technical field
The present invention relates to a kind of method that is used to discern characteristics of communication protocol of application software, belong to the network information security technology field.Be applicable in the network traffic data identifying description to characteristics of communication protocol of application software.
Background technology
Along with on the Internet in order to the rapid increase of the application software quantity of message transmission, the user is also increasing to the demand of using software and discerning.For example: enterprise wishes to identify point-to-point (P2P) class and downloads software, online game, stock information class, instant messaging class etc. and the irrelevant software of work, and then by forbidding the internet behavior that these softwares come the standard employee; The teen-age head of a family wishes that ISP (ISP) can accurately identify online game software, and the service that can forbid the online game software communication is provided; Colleges and universities and ISP user then wish to identify the P2P flow of a large amount of bandwidth-hoggings, thereby carry out traffic management control according to strategy.
Distinguish different classes of application software mainly the communication protocol by discerning each type application software exclusive feature finish, are wherein key technologies and how effectively to describe these protocol characteristics.The characteristics of communication protocol of application software describing method mainly contains following several in the prior art at present:
(1) code description method.This method is that condition code is write in the program code, and its shortcoming is to be unfavorable for safeguarding existing protocol characteristic and expansion New Deal feature, and each feature upgrades all needs to change program code, recompility program and upgrading products correlation module.
(2) regular expression method.This method is to utilize regular language statement protocol characteristic, and its shortcoming is that descriptive power is quite limited, and the very expensive source of regular expression matching characteristic.Experiment test finds, in the identifying, has match time of 90% to spend on the regular expression matched character string, and other check and analysis or function for monitoring only take the processing time seldom.
(3) self-defined describing method.This method is a kind of protocol characteristic descriptor format of User Defined.Deng Fan for every kind of application, adopts following information to be described in document " based on the method for recognizing flux of feature database " (patent, publication number are CN 101442489A):
Apply Names is convenient to the user and is checked;
Use ID, be convenient to system's retrieval;
Characteristic value is described, every kind of application can have a plurality of characteristic values to describe, and each characteristic value is described and comprised again: protocol type, feature string, feature string position (with respect to the skew of message head or tail), characteristic mask (some character in the representation feature character string can be any character).
The method that the document proposes, defective is that feature description is limited in one's ability, and it can only describe the key characteristics that the fixed position occurs in the single application layer load, and descriptive power is not as good as regular expression.
Summary of the invention
The objective of the invention is deficiency, propose a kind of describing method of more effective characteristics of communication protocol of application software at existing characteristics of communication protocol of application software describing method existence.The prerequisite that the present invention uses is to have analyzed the feature that acquisition needs the communication protocol of application software of identification from the network packet of catching, the method of using the present invention to go out then is described this characteristics of communication protocol of application software, so that realize the identification to this communication protocol of application software accurately.
The application software that the present invention relates to comprise P2P class software (as, loud, high-pitched sound Vagaa " picture " epoch software), instant messaging class software (as, MSN), online game class software (as, CS software) and stock information class software, but be not limited to above-mentioned software.
The prerequisite that the present invention uses is to have analyzed the feature of the communication protocol of application software that acquisition need discern.
Based on above-mentioned prerequisite, the present invention is achieved by the following technical solutions.
At first, provide the related notion definition.
Definition: connection features
Among the present invention in the network traffics finite time at interval in, source IP, source port, purpose IP, destination interface, the packet that transport layer protocol is identical belong to same connection.So-called connection features, the exclusive characteristics of a certain communication protocol of application software that promptly in a connection, embody.
Each communication protocol of application software can have many connection features, when the packet that belongs to same connection that grasps satisfies one of them connection features, just can finish the identification to this communication protocol of application software.
The describing method of a kind of characteristics of communication protocol of application software of the present invention is:
The present invention is provided with following description entry and describes a connection features: transport layer protocol characteristic item, source port characteristic item, destination interface characteristic item, single load characteristic item and multi-load behavioural characteristic item are formed.Wherein single load characteristic item is made up of position feature item, direction character item, length characteristic item, retention feature item, displacement characteristic item, reciprocity characteristic item, length operating characteristic item and port operating characteristic item; Multi-load behavioural characteristic item is not that the application layer of a plurality of continuous data bags loads on the common feature that forms on length, direction, the content in 0 the preceding finite population packet for packet application layer load length in connecting.Multi-load behavioural characteristic item is made up of a plurality of single load characteristic items.
Characteristics of communication protocol of application software is described as shown in Figure 1.
Elaborate the composition and the value constraint of each characteristic item among the figure below.
1. transport layer protocol characteristic item
The transport layer protocol type of the application layer load that the expression connection features is described; Optional value is " TCP ", " UDP "; This characteristic item does not have daughter element, occurs 1 time at most in connection features, does not occur representing that this connection features is applicable to TCP and two kinds of agreements of UDP.
2. source port characteristic item
The source port of the connection that the expression connection features is described belongs to one or more fixed values, perhaps belongs to a certain scope.The port span is 0~65535.The source port characteristic item occurs 1 time at most in connection features, passive port diagnostic do not occur representing.
3. destination interface characteristic item
The purpose of connecting port that the expression connection features is described belongs to one or more fixed values, perhaps belongs to a certain scope.The port span is 0~65535.The destination interface characteristic item occurs 1 time at most in connection features, the no destination interface feature of expression do not occur.
4. single load characteristic item
Feature on the application layer load content of a certain packet in the finite population packet before the expression connection application layer.Single load characteristic item is made up of following a few class subcharacter items:
1. position feature item:
The position of representing packet appearance in whole application connects that this list load characteristic item is described.The position can be a fixed value or a scope.For example preceding 4 byte content of application layer load are abcd feature appears in the 1st packet of connection, or application layer load end 4 bit byte contents are that the feature of 0x0a0b0c0d appears at after the 3rd packet, before the 10th packet.The position of the packet of mentioning is for the data packet sequencing that all application layer load length are not 0 among the present invention.Investigate the application layer load of preceding limited the packet that connects when investigating connection features at most.Preferable scheme is for investigating the feature of preceding 15 packets.Occur 1 time at most in the position feature Xiang Zaidan load characteristic item, do not occur representing that this feature may appear at the optional position.
2. direction character item:
Represent that the application layer load that this list load characteristic item is described is identical or opposite for connecting inceptive direction.For example: represent to represent opposite with 1 with the connection inceptive direction with to connect inceptive direction identical with 0.Occur 1 time at most in the direction character Xiang Zaidan load characteristic item, directionless feature do not occur representing.
3. length characteristic item:
Represent that the application layer load length that single load characteristic item is described belongs to one or more fixed values, perhaps belongs to a certain scope.The length here is meant the length of removing application layer load behind three layers of header.Occur 1 time at most in the length characteristic Xiang Zaidan load characteristic item, the no length characteristic of expression do not occur.
4. retention feature item:
Represent some feature strings fixed-site in the application layer load, and content is constant.Occurrence frequency is 0 to n time in the retention feature Xiang Zaidan load characteristic item, and n is the integer greater than 0.Retention feature item content sees Table 1.
Table 1 retention feature item content
Figure GDA0000049365760000041
Example: it is that 8 character string content is " abcdefgh " that the 11st byte begins length, and two byte content in bag end are 0x09dd.
5. displacement characteristic item:
Represent that some feature strings position is unfixing, the feature that content is fixing.Displacement characteristic item occurrence frequency in single load characteristic item is 0 to n time, and n is the integer greater than 0.Displacement characteristic item content sees Table 2.
Table 2 displacement characteristic item content
Figure GDA0000049365760000042
Figure GDA0000049365760000051
For example: locate the 4th byte to occurring the character string of content between the penult byte for " abcd " at distance applications layer load head.
6. reciprocity characteristic item:
Expression is distributed in the content of place, 2 fixed positions of application layer load equal length for equating or not waiting.Equity characteristic item occurrence frequency in single load characteristic item is 0 to n time, and n is the integer greater than 0.Equity characteristic item content sees Table 3.
The reciprocity characteristic item content of table 3
Figure GDA0000049365760000052
Example: it is 4 string A that length is got at the 3rd byte place, and it is 4 string B that length is got at the 30th byte place, has judged whether A==B
7. length operating characteristic item:
Represent content that this application layer loads on fixed position place regular length be converted into numerical value and with one fixedly the add deduct result of computing of correction value equal this application layer load length; The frequency that occurs in the length operating characteristic Xiang Zaidan load characteristic item is 0 to n time, and n is the integer greater than 0.Length operating characteristic item content sees Table 4.
Table 4 length operating characteristic item content
Figure GDA0000049365760000061
For example: effectively application layer load length is 32, and the content of third and fourth byte is 0x001c, and decimal value is 28, and 28+4=32 is then arranged, and wherein 4 is correction value.
8. port operating characteristic item:
Represent that this application layer loads on the fixed position and locates source port or the destination interface that the content of regular length equals this connection.The frequency that occurs in the port operating characteristic Xiang Zaidan load characteristic item is 0 to n time, and n is the integer greater than 0.Port operating characteristic item content sees Table 5.
Table 5 port operating characteristic item content
Figure GDA0000049365760000062
Figure GDA0000049365760000071
For example: connecting destination interface and be 3333, the 3 byte places, to get length be to be A after 4 the content decimal arithmetic, and A==3333 is then arranged.
5. multi-load behavioural characteristic item
Packet application layer load length is not that the application layer of a plurality of continuous data bags loads on the common feature that forms on length, direction, the content in 0 the preceding finite population packet in the connection.
Multi-load behavioural characteristic item is made up of a plurality of single load characteristic items.When the load of analytical applications software application layer, if the feature of single load is less relatively, cause bumping with other characteristics of communication protocol of application software, the feature of continuous a plurality of application layer loads in the finite population packet before then can the use in conjunction software protocol communicating to connect, thereby avoid the feature collision, increase recognition accuracy.Yet the multi-load behavioural characteristic will be investigated the feature of a plurality of packets, and for single load characteristic efficiently, the multi-load behavioural characteristic can expend Network Security Device more time and resource.
In a connection features, single load characteristic item and multi-load behavioural characteristic item are mutex relations, and promptly connection features only comprises a kind of in single load characteristic item and the multi-load behavioural characteristic item.
6. self-defining term
According to the specific characteristic of communication protocol of application software, the self-defining term of setting can be provided with multinomial.
Beneficial effect
The description of the invention mode is to propose on the basis of the common feature that refines a large amount of different classes of characteristics of communication protocol of application software, it has carried out clear and definite classification and definition to characteristics of communication protocol of application software, has strict logic, of a tightly knit structure, applied widely, characteristics such as extensibility is good.When the method that the present invention is proposed is used for communication protocol of application software identification, have efficient, accurately, in real time, advantage such as can expand.
Description of drawings
Fig. 1 is a characteristics of communication protocol of application software describing mode schematic diagram of the present invention.
Embodiment
According to technique scheme, the present invention is described in detail below in conjunction with embodiment.
Select P2P class, instant messaging class (IM), the online game class part application software different as the protocal analysis object, show that the describing method that how to use the present invention to set forth carries out protocol characteristic and describes with this four class of stock information class.The P2P class selects the broad-based Vagaa of domestic user to analyze in the four class softwares, and version is 2.6.6.3; The IM class selects the widest MSN of domestic and international application to analyze, and version is 2009 editions (version 14.0.8050.1202); Considering that the online game class is similar with the stock information class, is the function difference, and the present invention only selects online game anti-terrorism elite software to analyze, and version is 1.6v3647.
Experimental situation:
Hardware: Pentium IV3.0G processor, internal memory 1G;
Operating system: windows xp sp2;
Packet catcher software: wireshark
Test Application software: Vagaa, MSN, CS.
Network environment: ADSL dials up on the telephone, bandwidth 1M.
At first,, analyze above three kinds of communication protocol of application software, obtain protocol characteristic through the network packet capturing.
1.Vagaa agreement
The Vagaa protocol characteristic is as follows:
(1) the Vagaa agreement can be carried out file transfer by TCP and two kinds of host-host protocols of UDP;
(2) preceding 4 byte content of first application layer load of udp protocol are 0xff0a0c02, and load length perseverance is 8;
(3) preceding 4 byte content of first application layer load of udp protocol are 0xff0e0000, and load length perseverance is 12;
(4) preceding 4 byte content of first application layer load of UDP or Transmission Control Protocol are 0xffdee3e4, and load length is greater than 68;
(5) preceding two byte content of first application layer load of UDP or Transmission Control Protocol are 0x3cb0, and the 4th, 5 byte content are 0x649b;
(6) continuous 3 application layer load length of Transmission Control Protocol are not in 0 the packet, the application layer load length range of first bag is 220~240, the application layer load length range of second bag is that the application layer load length value of the 160~200, three bag is 26 or 80;
(7) continuous 3 application layer load length of Transmission Control Protocol are not in 0 the packet, the application layer load length of first bag is 26, the application layer load length of second bag is a certain value in 29,66,188,10,14, and the application layer load length of the 3rd bag is a certain value in 26,54,14,10.
(8) continuous 3 application layer load length of udp protocol are not that the application layer load length of first bag is a certain value in 8,12,16 in 0 the packet, and the application layer load length of second bag is that the application layer load length of 4, the three bags is 4.
2.MSN agreement
The MSN protocol characteristic is as follows:
(1) the MSN agreement is carried out file transfer by the TCP host-host protocol;
(2) preceding 4 byte content of first bag application layer load of Transmission Control Protocol are " VER ", and having content after the 4th byte is the character string of " MSNP ", and the position of this character string is unfixing;
(3) first bag application layer preceding 6 byte content of load " ISR 1 " of Transmission Control Protocol, latter two byte content is 0x0d0a;
(4) first bag application layer load preceding 6 byte content of Transmission Control Protocol are " ANS 1 ", and latter two byte content is 0x0d0a.
3. CS agreement
The CS protocol characteristic is as follows:
(1) the CS agreement is carried out file transfer by the UDP host-host protocol;
(2) preceding 16 byte content of first bag application layer load of udp protocol are 0xffffffff6765746368616c6c656e6765;
(3) the preceding 25 byte content 0xffffffff54536f7572636520456e67696e6520517565727900 of first bag reference level load of udp protocol.
The feature of explaining above-mentioned communication protocol of application software according to the feature description mode of the present invention's proposition is as follows:
1.Vagaa agreement
Vagaa soft communication agreement feature is made up of 7 connection features:
(1) connection features is made up of a transport layer protocol characteristic item and a single load characteristic item, and transport layer protocol characteristic item value is UDP, represents that the connection employing transport layer protocol that this feature identifies is UDP.Single load characteristic item is made up of position feature item, length characteristic item and a retention feature item: position feature item value is 1, represents that characteristic information that this list load characteristic item is write down is arranged in first application load of connection; Length characteristic item content is for equaling 8, and offset is 1 in the retention feature item, and characteristic length is 4, and feature is 0xff0a0c0a, and the operator item is EQ.
(2) connection features is made up of a transport layer protocol characteristic item and a single load characteristic item, and transport layer protocol characteristic item value is UDP.Single load characteristic item is made up of position feature item, length characteristic item and a retention feature item: position feature item value is 1, length characteristic equals 12 to value, and offset is 1 in the retention feature item, and characteristic length is 4, feature is 0xff0e0000, and the operator item is EQ.
(3) connection features is made up of a single load characteristic item, single load characteristic item is made up of position feature item, length characteristic item and a retention feature item: position feature item value is 1, length characteristic item value is greater than 68, offset is 1 in the retention feature item, characteristic length is 4, feature is 0xff0e0000, and the operator item is EQ.
(4) connection features is made up of a single load characteristic item: single load characteristic item is made up of position feature item and two retention feature items: position feature item value is 1, offset is 1 in first retention feature item, characteristic length is 2, and feature is 0x3cb0, and the operator item is EQ; Offset is 4 in second retention feature item, and characteristic length is 2, and feature is 0x649b, and the operator item is EQ.
(5) connection features is made up of a transport layer protocol characteristic item and a multi-load behavioural characteristic item.Transport layer protocol characteristic item value is TCP.Multi-load behavioural characteristic Xiang Yousan single load characteristic item formed: first single load characteristic Xiang Youyi length characteristic item formed, and value is between 220~240.Second single load characteristic Xiang Youyi length characteristic item formed, and value is between 160~200.The 3rd single load characteristic Xiang Youyi length characteristic item formed, and value is 26 or 80.
(6) connection features is made up of a transport layer protocol characteristic item and a multi-load behavioural characteristic item.Transport layer protocol characteristic item value is TCP.Multi-load behavioural characteristic Xiang Yousan single load characteristic item formed: first single load characteristic Xiang Youyi length characteristic item formed, and value is 26.Second single load characteristic Xiang Youyi length characteristic item formed, and value is 29 or 66 or 188 or 14 or 10.The 3rd single load characteristic Xiang Youyi length characteristic item formed, and value is 26 or 54 or 14 or 10.
(7) connection features is made up of a transport layer protocol characteristic item and a multi-load behavioural characteristic item.Transport layer protocol characteristic item value is UDP.Multi-load behavioural characteristic Xiang Yousan single load characteristic item formed: first single load characteristic Xiang Youyi length characteristic item formed, and value is 16 or 12 or 8.Second single load characteristic Xiang Youyi length characteristic item formed, and value is 4.The 3rd single load characteristic Xiang Youyi length characteristic item formed, and value is 4
2.MSN agreement
MSN software protocol feature is made up of 3 connection features:
(1) connection features is made up of a transport layer protocol characteristic item and a single load characteristic item: transport layer protocol characteristic item value is TCP; Single load characteristic item is made up of position feature item, a retention feature item and a displacement characteristic item.Position feature item value is 1, and offset is 1 in the retention feature item, and characteristic length is 4, and feature is " VER ", and the operator item is EQ; The original position skew is 5 in the displacement characteristic item, and the final position skew is for-1, and characteristic length is 4, and feature is " MSNP ", and the operator item is EQ.
(2) connection features is made up of a transport layer protocol characteristic item and a single load characteristic item: transport layer protocol characteristic item value is TCP; Single load characteristic item is made up of position feature item and two retention feature items: position feature item value is 1, and offset is 1 in first retention feature item, and characteristic length is 6, and feature is EQ for " ISR 1 " operator item; Offset is-1 in second retention feature item, and characteristic length is 2, and feature is 0x0d0a, and the operator item is EQ.
(3) connection features is made up of a transport layer protocol characteristic item and a single load characteristic item: transport layer protocol characteristic item value is TCP; Single load characteristic item is made up of position feature item and two retention feature items: position feature item value is 1, and offset is 1 in first retention feature item, and characteristic length is 6, and feature is " ANS 1 ", and the operator item is EQ; Offset is-1 in second retention feature item, and characteristic length is 2, and feature is 0x0d0a, and the operator item is EQ.
3. CS agreement
The CS software protocol is made up of two connection features:
(1) connection features is made up of a transport layer protocol characteristic item and a single load characteristic item, and transport layer protocol characteristic item value is UDP.Single load characteristic item is made up of position feature item and a retention feature item: position feature item value is 1, offset is 1 in the long retention feature item, characteristic length is 16, and feature is 0xffffffff6765746368616c6c656e6765, and the operator item is EQ.
(2) connection features is made up of a transport layer protocol characteristic item and a single load characteristic item, and transport layer protocol characteristic item value is UDP.Single load characteristic item is made up of position feature item and a retention feature item: position feature item value is 1, offset is 1 in the long retention feature item, characteristic length is 25, feature is 0xffffffff54536f7572636520456e67696e6520517565727900, and the operator item is EQ.
After the describing method of the characteristics of communication protocol of application software that proposes by the present invention is described the feature of using soft communication agreement, can realize identification exactly to this communication protocol of application software.
Of particular note, to those skilled in the art, under the prerequisite that does not break away from the principle of the invention, can also make some improvement, these also should be considered as belonging to protection scope of the present invention.

Claims (1)

1. method that is used to discern characteristics of communication protocol of application software, this method is carried out clear and definite classification and definition to characteristics of communication protocol of application software, realization is to the identification of this communication protocol of application software, it is characterized in that: the feature of from the network packet of catching, analyzing the communication protocol of application software that obtains needs identification, realize identification to this communication protocol of application software according to the feature of this communication protocol of application software, the description entry of this characteristics of communication protocol of application software is by the transport layer protocol characteristic item, the source port characteristic item, the destination interface characteristic item, single load characteristic item, multi-load behavioural characteristic item and self-defining term are formed; Wherein single load characteristic item is made up of position feature item, direction character item, length characteristic item, retention feature item, displacement characteristic item, reciprocity characteristic item, length operating characteristic item and port operating characteristic item; Multi-load behavioural characteristic item is not that the application layer of a plurality of continuous data bags loads on the common feature that forms on length, direction, the content in 0 the preceding finite population packet for packet application layer load length in connecting; Multi-load behavioural characteristic item is made up of a plurality of single load characteristic items; Self-defining term is the specific characteristic of user according to communication protocol of application software, the self-defining term of setting;
The composition and the value of each characteristic item are constrained to:
(1). the transport layer protocol characteristic item
The transport layer protocol type of the application layer load that the expression connection features is described; The choosing value is " TCP ", " UDP "; This characteristic item does not have daughter element, occurs 1 time at most in connection features, does not occur representing that this connection features is applicable to TCP and two kinds of agreements of UDP;
(2). the source port characteristic item
The source port of the connection that the expression connection features is described belongs to one or more fixed values, perhaps belongs to a certain scope; The port span is 0~65535; The source port characteristic item occurs 1 time at most in connection features, passive port diagnostic do not occur representing;
(3). the destination interface characteristic item
The purpose of connecting port that the expression connection features is described belongs to one or more fixed values, perhaps belongs to a certain scope; The port span is 0~65535; The destination interface characteristic item occurs 1 time at most in connection features, the no destination interface feature of expression do not occur;
(4). single load characteristic item
Feature on the application layer load content of a certain packet in the finite population packet before the expression connection application layer; Single load characteristic item is made up of following a few class subcharacter items:
1. position feature item:
The position of representing packet appearance in whole application connects that this list load characteristic item is described; The position is a fixed value or a scope; The position of packet is for the data packet sequencing that all application layer load length are not 0; Investigate the application layer load of preceding limited the packet that connects when investigating connection features at most; Occur 1 time at most in the position feature Xiang Zaidan load characteristic item, do not occur representing that this feature appears at the optional position;
2. direction character item:
Represent that the application layer load that this list load characteristic item is described is identical or opposite for connecting inceptive direction; Occur 1 time at most in the direction character Xiang Zaidan load characteristic item, directionless feature do not occur representing;
3. length characteristic item:
Represent that the application layer load length that single load characteristic item is described belongs to one or more fixed values, perhaps belongs to a certain scope; The length here is meant the length of removing application layer load behind three layers of header; Occur 1 time at most in the length characteristic Xiang Zaidan load characteristic item, the no length characteristic of expression do not occur;
4. retention feature item:
Represent some feature strings fixed-site in the application layer load, and content is constant; Occurrence frequency is 0 to n time in the retention feature Xiang Zaidan load characteristic item, and n is the integer greater than 0; Retention feature item content sees Table 1;
Table 1 retention feature item content
Figure FDA0000071229870000031
5. displacement characteristic item:
Represent that some feature strings position is unfixing, the feature that content is fixing; Displacement characteristic item occurrence frequency in single load characteristic item is 0 to n time, and n is the integer greater than 0; Displacement characteristic item content sees Table 2;
Table 2 displacement characteristic item content
Figure FDA0000071229870000032
6. reciprocity characteristic item:
Expression is distributed in the content of place, 2 fixed positions of application layer load equal length for equating or not waiting; Equity characteristic item occurrence frequency in single load characteristic item is 0 to n time, and n is the integer greater than 0; Equity characteristic item content sees Table 3;
The reciprocity characteristic item content of table 3
7. length operating characteristic item:
Represent content that this application layer loads on fixed position place regular length be converted into numerical value and with one fixedly the add deduct result of computing of correction value equal this application layer load length; The frequency that occurs in the length operating characteristic Xiang Zaidan load characteristic item is 0 to n time, and n is the integer greater than 0; Length operating characteristic item content sees Table 4;
Table 4 length operating characteristic item content
Figure FDA0000071229870000042
8. port operating characteristic item:
Represent that this application layer loads on the fixed position and locates source port or the destination interface that the content of regular length equals this connection; The frequency that occurs in the port operating characteristic Xiang Zaidan load characteristic item is 0 to n time, and n is the integer greater than 0; Port operating characteristic item content sees Table 5;
Table 5 port operating characteristic item content
Figure FDA0000071229870000043
Figure FDA0000071229870000051
(5). multi-load behavioural characteristic item
Packet application layer load length is not that the application layer of a plurality of continuous data bags loads on the common feature that forms on length, direction, the content in 0 the preceding finite population packet in the connection;
Multi-load behavioural characteristic item is made up of a plurality of single load characteristic items; When the load of analytical applications software application layer, if the feature of single load is less relatively, cause bumping with other characteristics of communication protocol of application software, the feature of continuous a plurality of application layer loads in the finite population packet before then the use in conjunction software protocol communicates to connect, thereby avoid the feature collision, increase recognition accuracy; Yet the multi-load behavioural characteristic will be investigated the feature of a plurality of packets, and for single load characteristic efficiently, the multi-load behavioural characteristic can expend Network Security Device more time and resource;
In a connection features, single load characteristic item and multi-load behavioural characteristic item are mutex relations, and promptly connection features only comprises a kind of in single load characteristic item and the multi-load behavioural characteristic item;
(6). self-defining term
According to the specific characteristic of communication protocol of application software, multinomial self-defining term is set.
CN2009102374338A 2009-11-06 2009-11-06 Method for describing characteristics of communication protocol of application software Expired - Fee Related CN101710898B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009102374338A CN101710898B (en) 2009-11-06 2009-11-06 Method for describing characteristics of communication protocol of application software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009102374338A CN101710898B (en) 2009-11-06 2009-11-06 Method for describing characteristics of communication protocol of application software

Publications (2)

Publication Number Publication Date
CN101710898A CN101710898A (en) 2010-05-19
CN101710898B true CN101710898B (en) 2011-10-19

Family

ID=42403658

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009102374338A Expired - Fee Related CN101710898B (en) 2009-11-06 2009-11-06 Method for describing characteristics of communication protocol of application software

Country Status (1)

Country Link
CN (1) CN101710898B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102938764B (en) * 2012-11-09 2015-05-20 北京神州绿盟信息安全科技股份有限公司 Application identification processing method and device
CN105871832B (en) * 2016-03-29 2018-11-02 北京理工大学 A kind of network application encryption method for recognizing flux and its device based on protocol attribute
CN106101061A (en) * 2016-05-24 2016-11-09 北京奇虎科技有限公司 The automatic classification method of rogue program and device
CN106060025A (en) * 2016-05-24 2016-10-26 北京奇虎科技有限公司 Automatic application classification method and automatic application classification device
CN107465570B (en) * 2017-07-12 2020-12-15 西安交大捷普网络科技有限公司 Data packet keyword detection method based on ring queue
CN115242691B (en) * 2022-07-04 2023-05-19 中国电子科技集团公司第三十研究所 Protocol identification method based on protocol feature library

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101035111A (en) * 2007-04-13 2007-09-12 北京启明星辰信息技术有限公司 Intelligent protocol parsing method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101035111A (en) * 2007-04-13 2007-09-12 北京启明星辰信息技术有限公司 Intelligent protocol parsing method and device

Also Published As

Publication number Publication date
CN101710898A (en) 2010-05-19

Similar Documents

Publication Publication Date Title
CN101827084B (en) Efficient application identification with network devices
CN101710898B (en) Method for describing characteristics of communication protocol of application software
US8220048B2 (en) Network intrusion detector with combined protocol analyses, normalization and matching
US7548848B1 (en) Method and apparatus for semantic processing engine
CN102724317A (en) Network data flow classification method and device
RU2419986C2 (en) Combining multiline protocol accesses
IL275042A (en) Self-adaptive application programming interface level security monitoring
Sija et al. A survey of automatic protocol reverse engineering approaches, methods, and tools on the inputs and outputs view
CN102316087A (en) The detection method that network application is attacked
CN100553206C (en) Internet, applications method for recognizing flux based on packet sampling and application signature
CN112769633B (en) Proxy traffic detection method and device, electronic equipment and readable storage medium
CN102571946B (en) Realization method of protocol identification and control system based on P2P (peer-to-peer network)
CN104333483A (en) Identification method, system and identification device for internet application flow
CN107404459B (en) Method for acquiring fingerprint characteristics of network attack message and network equipment
CN104333461A (en) Identification method, system and identification device for internet application flow
CN106452954B (en) HTTP data characteristics analysis method and system
US10333769B2 (en) Deployable linear bitwise protocol transformation
CN114070800A (en) SECS2 traffic rapid identification method combining deep packet inspection and deep stream inspection
CN101854366A (en) Peer-to-peer network flow-rate identification method and device
CN104796426B (en) The detection method at webpage back door
CN105681317A (en) Novel business and database auditing engine
CN102185758A (en) Protocol recognizing method based on Ares message tagged word
CN116192527A (en) Attack flow detection rule generation method, device, equipment and storage medium
Oudah et al. Using burstiness for network applications classification
CN108650229A (en) A kind of network application behavior parsing restoring method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20111019

Termination date: 20141106

EXPY Termination of patent right or utility model