CN110602073B - Unmanned aerial vehicle flight control protocol field division method based on information theory - Google Patents

Unmanned aerial vehicle flight control protocol field division method based on information theory Download PDF

Info

Publication number
CN110602073B
CN110602073B CN201910822782.XA CN201910822782A CN110602073B CN 110602073 B CN110602073 B CN 110602073B CN 201910822782 A CN201910822782 A CN 201910822782A CN 110602073 B CN110602073 B CN 110602073B
Authority
CN
China
Prior art keywords
flight control
hexadecimal
control protocol
data
hex
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910822782.XA
Other languages
Chinese (zh)
Other versions
CN110602073A (en
Inventor
杨超
范偲彧
马建峰
郑昱
苏锐丹
贾哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
CETC 54 Research Institute
Original Assignee
Xidian University
CETC 54 Research Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University, CETC 54 Research Institute filed Critical Xidian University
Priority to CN201910822782.XA priority Critical patent/CN110602073B/en
Publication of CN110602073A publication Critical patent/CN110602073A/en
Application granted granted Critical
Publication of CN110602073B publication Critical patent/CN110602073B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/18502Airborne stations
    • H04B7/18506Communications with or from aircraft, i.e. aeronautical mobile service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/03Protocol definition or specification 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/26Special purpose or proprietary protocols or architectures

Abstract

The invention provides an unmanned aerial vehicle flight control protocol field division method based on an information theory. The method aims to improve the accuracy of continuous change field division by mining the information quantity expressed by data as a feature, and comprises the following steps: the method comprises the steps of preprocessing an unmanned aerial vehicle flight control protocol data set, acquiring a regular field bit number set L and a random field bit number set R based on an information theory, acquiring a separation point bit number set E of the regular field bit number set L based on the information theory, and dividing the random field bit number set R based on the information theory to acquire all field separation points. The statistical characteristics extracted by the method are the information quantity obtained from the data, the potential semantic information of the fields is fully mined, the unmanned plane flight control protocol is divided into completely random fields, flight control related fields and a plurality of regular fields, and the accuracy of dividing the continuous change fields in the unmanned plane flight control protocol is improved.

Description

Unmanned aerial vehicle flight control protocol field division method based on information theory
Technical Field
The invention belongs to the technical field of wireless communication, relates to a method for dividing a flight control protocol field of an unmanned aerial vehicle, and particularly relates to a method for reversely analyzing a syntax of the flight control protocol of the unmanned aerial vehicle based on an information theory.
Background
The unmanned aerial vehicle communication system is a system for transmitting an operation instruction between an operator and an unmanned aerial vehicle through a wireless network according to a set binary protocol. These predetermined binary protocols are the drone communication protocol, and the protocol responsible for the transmission of the flight instructions of the drone is the drone flight control protocol.
Along with the popularization of unmanned aerial vehicles, the lack of a method for controlling the unmanned aerial vehicles becomes a significant problem, the technology of completely controlling the unmanned aerial vehicles by a third party can become an optimal solution for the control of the unmanned aerial vehicles, and the aim of controlling the unmanned aerial vehicles by forging data packets through a reverse unmanned aerial vehicle flight control protocol can be fulfilled.
The unmanned aerial vehicle flight control protocol reverse direction refers to a process of extracting grammar and semantics of the unmanned aerial vehicle flight control protocol by analyzing a large number of unmanned aerial vehicle flight control protocol data packets or monitoring and analyzing the construction and analysis flows of the flight control protocol data packets without depending on protocol description. The unmanned plane flight control protocol reverse analysis comprises unmanned plane flight control protocol field division and unmanned plane flight control protocol field semantic analysis. The unmanned plane flight control protocol field division refers to division of fields with different meanings under the condition of not depending on the semantics, and the unmanned plane flight control protocol field semantic analysis refers to excavation of the meaning to be expressed by each field.
The unmanned plane flight control protocol reverse analysis mainly comprises unmanned plane flight control protocol reverse analysis based on an execution track and unmanned plane flight control protocol reverse analysis based on a datagram. The unmanned aerial vehicle flight control protocol reverse analysis based on the execution track means that the protocol format is extracted by analyzing the generation and analysis processes of the unmanned aerial vehicle flight control protocol data packet in the control equipment, the unmanned aerial vehicle chip and the like. The datagram-based unmanned aerial vehicle flight control protocol reverse analysis means that a large number of unmanned aerial vehicle flight control protocol data packets are intercepted through tools or software, the unmanned aerial vehicle flight control protocol data packets are used as analysis objects, and a protocol format is obtained through inference according to some statistical characteristics of values of protocol fields.
The existing unmanned plane flight control protocol field division method based on the numerical value change rate is a mainstream method, the method firstly analyzes common design ideas of unmanned plane flight control protocol designers, and then summarizes statistical characteristics of the numerical value change rate of common fields, however, many unmanned plane flight control protocol designers already design fields by using complex rules, and the statistical characteristics cannot essentially reflect the relation between two pieces of data in flight control protocol data.
Ji Ran et al discloses an unmanned aerial vehicle Flight Control protocol Automatic Reverse analysis method in a published paper of Automatic Reverse Engineering of Private Flight Control Protocols of UAVs (Security and Communication Networks, 2017), the method determines a field semantic as a Flight Control field by using time information of an unmanned aerial vehicle Flight Control protocol data packet and recorded Flight states, and determines a field semantic as a check bit field by using a check bit generation matrix reduction algorithm, so that contribution is provided for unmanned aerial vehicle Flight Control protocol semantic Automatic analysis, but the unmanned aerial vehicle Flight Control protocol field division method still performs division by using numerical value change or not as a numerical value change rate characteristic, so that the method has lower division accuracy for continuous change fields.
Disclosure of Invention
The invention aims to overcome the defects in the prior art, provides an unmanned aerial vehicle flight control protocol field division method based on an information theory, and aims to solve the technical problem that the division accuracy rate of continuously-changing fields in the prior art is low.
In order to achieve the purpose, the invention adopts the technical scheme that:
an unmanned aerial vehicle flight control protocol field division method based on an information theory comprises the following steps:
(1) preprocessing an unmanned aerial vehicle flight control protocol data set:
(1a) collecting M binary flight control protocol data packets in a time range of T, converting the M binary flight control protocol data packets into hexadecimal data, wherein each hexadecimal flight control protocol data packet comprises h hexadecimal data, T is more than 10min, M is more than 10000, and h is more than or equal to 1;
(1b) arranging M hexadecimal flight control protocol data packets into a hexadecimal flight control data set D according to the sequence of binary flight control protocol data packet acquisition, wherein D is { D ═ D1,D2,...,Dj,...,DM},DjIndicating the jth data packet, Dj={d1,j,d2,j,...,di,j,...,dh,j},di,jRepresents the hexadecimal data in the jth data packet at the ith bit, and the value is expressed as | di,jI, the i-th hexadecimal data in each hexadecimal flight control protocol data packet form a hexadecimal data set SiWherein i is more than or equal to 1 and less than or equal to h, and j is more than or equal to 1 and less than or equal to M;
(1c) when j is less than or equal to m, adding SiMiddle data di,jComposing a hexadecimal data set X1,iAnd will | di,jL constitutes the hexadecimal value set X'1,iWill SiThe rest of data di,jComposing a hexadecimal data set X2,iAnd will | di,jL constitutes the hexadecimal value set X'2,iWherein, in the step (A),
Figure GDA0002963051610000031
represents rounding down;
(2) acquiring a regular field bit number set L and a random field bit number set R based on an information theory:
(2a) setting a threshold value V, constructing a set HEX containing 16 hexadecimal values, wherein the u-th element in the HEX is represented as HEX, and the u-th element is represented as HEX {0,1,2,3,4,5,6,7,8,9, a, b, c, d, e and f }u
(2b) When d isi,j∈X1,iThen all will satisfy | di,j-1|=HEXuD ofi,j| constitutes a set of hexadecimal values I1,i,uWhen d isi,j∈X2,iThen all will satisfy | di,j-1|=HEXuD ofi,j| constitutes a set of hexadecimal values I2,i,u
(2c) By means of the set X1,iAnd set I1,i,uCalculating X'1,iD ini,j-1I and | di,jConditional entropy between | H1,iBy means of the set X2,iAnd set I2,i,uCalculating X'2,iD ini,j-1I and | di,jConditional entropy between | H2,iAnd will satisfy
Figure GDA0002963051610000032
All i form a regular field bit number set L, and the rest i form a random field bit number set R;
(3) acquiring a separation point bit number set E of a regular field bit number set L based on an information theory:
(3a) when d isi,j∈X1,iAnd i, i +1 ∈ L, all will satisfy | di-1,j|=HEXuD ofi,jL constitutes the hexadecimal value set I'1,i,uWhen d isi,j∈X2,iAnd i, i +1 ∈ L, all will satisfy | di-1,j|=HEXuD ofi,jL constitutes the hexadecimal value set I'2,i,u
(3b) By means of the set X1,iAnd aggregate I'1,i,uCalculating X'1,i-1D ini-1,jL and X'1,iD ini,jConditional entropy between l H'1,iBy means of the set X2,iAnd aggregate I'2,i,uCalculating X'2,i-1D ini-1,jL and X'2,iD ini,jConditional entropy between l H'2,iAnd will satisfy
Figure GDA0002963051610000033
All i of (a) form a separation point digit set E;
(4) dividing a random field bit number set R based on an information theory:
(4a) setting a threshold value N;
(4b) when i ∈ R, the number of strips
Figure GDA0002963051610000034
As a unit, adding SiThe medium data are divided into f groups, Si={Si,1,Si,2,...,Si,z,...,Si,fIn which S isi,zDenotes SiWhen d is the group z data ofi,j∈Si,zWhen, will | di,j| constitute a set of hexadecimal values Wi,zWherein
Figure GDA0002963051610000041
Represents rounding down;
(4c) computing a set Wi,zEntropy of aroma concentration C of each elementi,zAnd then S isiIn each group Si,zC of (A)i,zForm a set G of fragrance concentration entropyi
(4d) All C's were clustered using KMeans algorithmi,zClustering into two types of large central value and small central value of the fragrance concentration entropy, taking the type of large central value of the fragrance concentration entropy as a completely random type A, and taking the type of small central value of the fragrance concentration entropy as a flight control related type B;
(4e) g is to beiIn satisfy Ci,zThe number of elements belonging to the group of A is GiThe ratio of the total number of elements in the formula is represented by wiAnd all satisfy wiI more than or equal to N forms a complete random field bit number set RT, and the rest forms a flight control related field bit number set FC;
(5) acquiring all field separation points:
and adding all i which satisfy that i and i +1 do not belong to the set RT or the set FC or the set L at the same time into the separation point digit set E, and finally, all elements in the set E are all field separation points.
Compared with the prior art, the invention has the following advantages:
the statistical characteristics used when the continuous change fields are divided are the information quantity obtained from the data, the potential semantics of the fields are fully mined, and the unmanned plane flight control protocol is divided into the completely random fields, the flight control related fields and the plurality of regular fields, so that the problem that the relation among the data cannot be essentially reflected by using the numerical value change rate as the statistical characteristics in the prior art is solved, and compared with the prior art, the accuracy of the division of the continuous change fields in the unmanned plane flight control protocol is effectively improved.
Drawings
FIG. 1 is a flow chart of an implementation of the present invention.
Detailed Description
The invention is described in further detail below with reference to the figures and the specific embodiments.
Referring to fig. 1, the present invention includes the steps of:
step 1) preprocessing an unmanned aerial vehicle flight control protocol data set:
step 1a) acquiring M binary flight control protocol data packets within a time range T, wherein the binary system only comprises two values of 0 and 1, and the entropy values are very close to each other due to coincidence when the binary system is directly applied to the calculation of the information entropy, so that the binary system is converted into a hexadecimal system, each hexadecimal flight control protocol data packet comprises h hexadecimal data, T is more than 10min, M is more than 10000, h is more than or equal to 1, in the example, T is 10.25min, M is 24651, and h is 40;
step 1b) arranging M hexadecimal flight control protocol data packets into a hexadecimal flight control data set D according to the sequence of binary flight control protocol data packet acquisition, wherein D is { D ═ D }1,D2,...,Dj,...,DM},DjIndicating the jth data packet, Dj={d1,j,d2,j,...,di,j,...,dh,j},di,jRepresents the hexadecimal data in the jth data packet at the ith bit, and the value is expressed as | di,jI, the i-th hexadecimal data in each hexadecimal flight control protocol data packet form a hexadecimal data set SiWherein i is more than or equal to 1 and less than or equal to h, and j is more than or equal to 1 and less than or equal to M;
step 1c) the hexadecimal flight control data set D is divided into two data sets in a balanced way, namely when j is less than or equal to m, S is dividediMiddle data di,jComposing a hexadecimal data set X1,iAnd will | di,jL constitutes the hexadecimal value set X'1,iWill SiThe rest of data di,jComposing a hexadecimal data set X2,iAnd will | di,jL constitutes the hexadecimal value set X'2,iWherein, in the step (A),
Figure GDA0002963051610000051
represents rounding down, in this example m-12325;
step 2) acquiring a regular field bit number set L and a random field bit number set R based on the information theory:
step 2a) sets a threshold V, constructs a set HEX containing 16 hexadecimal values {0,1,2,3,4,5,6,7,8,9, a, b, c, d, e, f }, where the u-th element in HEX is denoted HEXuIn this example, V ═ 0.1;
step 2b) when di,j∈X1,iThen all will satisfy | di,j-1|=HEXuD ofi,j| constitutes a set of hexadecimal values I1,i,uWhen d isi,j∈X2,iThen all will satisfy | di,j-1|=HEXuD ofi,j| constitutes a set of hexadecimal values I2,i,u
Step 2c) even if the median values of both regular and random fields are constantly changing, for the regular field | di,jI is to d according to a certain rulei,j-1The result of the calculation is made, | so although the law is unknown, it can be passed | d depending on the acquired datai,j-1I predict | di,jFor random fields, | di,jI and | di,j-1I has no operational relationship between I, therefore, can not pass through | di,j-1I predict | di,jL. Conditional entropy in information theory reflects uncertainty between data and thus can be used to reflect whether | d can be passedi,j-1I predict | di,jFor the two data sets X obtained in step 1c) |, the data sets X are stored in a memory1,iAnd X2,iIn the rule field, no matter X1,iOr X2,iCan all pass through di,j-1I predict | di,jI, so that the conditional entropy does not vary much, but no matter X in the random field1,iOr X2,iAll can not pass through di,j-1I predict | di,jAnd therefore the conditional entropy fluctuation is large. Since the values in each data packet are likely to change in the regular field and the random field, and the change rates of the values are likely to be similar, the change rate of the values as the statistical characteristic cannot essentially reflect the essential difference between the regular field and the random field, and the conditional entropy as the statistical characteristic is mined from | di,j-1Derived in | regarding | di,jThe information amount of | can reflect the regular field and the random in natureThe field difference can effectively improve the accuracy of dividing the continuous random field and the regular field, so that the method is based on a formula
Figure GDA0002963051610000061
By means of the set X1,iAnd set I1,i,uCalculating X1,iD ini,j-1I and | di,jCondition H between |1,iAccording to the formula
Figure GDA0002963051610000062
By means of the set X2,iAnd set I2,i,uCalculating X2,iD ini,j-1I and | di,jCondition H between |2,iAnd will satisfy
Figure GDA0002963051610000063
All i form a regular field bit number set L, and the rest i form a random field bit number set R, wherein X is X't,iP (X) is X't,iProbability of occurrence of x in (2)1Is I1,i,uAll first occurring elements in (A), p (y)1| x) is HEXuWhen x is equal to I1,i,uY in the set1Probability of occurrence, y2Is I2,i,uAll first occurring elements in (A), p (y)2| x) is HEXuWhen x is equal to I2,i,uY in the set2The probability of occurrence;
step 3) acquiring a separation point bit number set E of the regular field bit number set L based on the information theory:
step 3a) when di,j∈X1,iAnd i, i +1 ∈ L, all will satisfy | di-1,j|=HEXuD ofi,jL constitutes set I'1,i,uWhen d isi,j∈X2,iAnd i, i +1 ∈ L, all will satisfy | di-1,j|=HEXuD ofi,jL constitutes set I'2,i,u
Step 3b) even if the values in the plurality of rule fields obeying different rules are constantly changed, the fields obeying the same rule are long due to the field lengthThe value change in the field must be cyclic, so that if there are a large number of packets to analyze (the value in the field should complete many cycles), the value can be analyzed via | d |i-1,jI predict | di,jDistribution rule of | for | d between fields subject to different rulesi-1,jI and | di,jI, the following rules of the front and back fields are different, so that the I can not pass through the I di-1,jI predict | di,jThe distribution rule of | and the conditional entropy in the information theory reflect the uncertainty between data, so that the method can be used for reflecting whether | d can be passedi-1,jI predict | di,jI distribution rule of the two data sets X obtained in step 1c)1,iAnd X2,iIn the same rule field, | di-1,jI and | di,jI obey a uniform law no matter X1,iOr X2,iCan all pass through di-1,jI predict | di,jThe distribution rule of | is that the conditional entropy will not change greatly, but for | d obeying different rulesi-1,jI and | di,jL, no matter X1,iOr X2,iAll can not pass through di-1,jI predict | di,jThe distribution rule of | is regular, so the conditional entropy fluctuation is large. Because the values in the regular fields all change according to a certain rule, the change rate of the values can be correctly divided as statistical characteristics only when the change rates of the lowest bit of the previous regular field and the highest bit of the next regular field are clearly changed and distinguished, and the fields which obey the same rule can be divided into two fields due to improper characteristic selection, and the conditional entropy is used as statistical characteristics for miningi-1,jDerived in | regarding | di,jThe information content of | can essentially reflect whether the connection exists between the front and back two-bit data, and can effectively improve the accuracy of dividing two continuous fields which obey different rules, so that the method is based on a formula
Figure GDA0002963051610000071
By means of the set X1,iAnd aggregate I'1,i,uCalculating X1,i-1D ini-1,jI and X1,iD ini,jCondition between |Entropy H'1,iAccording to the formula
Figure GDA0002963051610000072
By means of the set X2,iAnd aggregate I'2,i,uCalculating X2,i-1D ini-1,jI and X2,iD ini,jConditional entropy between l H'2,iAnd will satisfy
Figure GDA0002963051610000073
All i of (a) constitute a set of bin bit numbers E, wherein X is X't,iAll of the first occurring elements of (a), (b), (c), (d'1Is l'1,i,uAll of the first occurring elements of (a), p (y'1| x) is HEXuX is'1,i,uY 'in the set'1Probability of occurrence, y'2Is l'2,i,uAll of the first occurring elements of (a), p (y'2| x) is HEXuX is'2,i,uY 'in the set'2The probability of occurrence;
step 4) dividing the random field bit number set R based on the information theory:
step 4a) setting a threshold value N;
step 4b) when i ∈ R, counting by number
Figure GDA0002963051610000074
As a unit, adding SiThe medium data are divided into f groups, i.e. Si={Si,1,Si,2,...,Si,z,...,Si,fIn which S isi,zDenotes SiWhen d is the group z data ofi,j∈Si,zWhen, will | di,j| constitute a set of hexadecimal values Wi,zWherein
Figure GDA0002963051610000075
Denotes rounding down, i.e. grouping by the average number of packets collected per second, which is calculated in this example from T ═ 10.25min and M ═ 24651, obtained in step 1a)
Figure GDA0002963051610000081
f=615;
Step 4c) the flight control field and its related fields in the unmanned plane flight control protocol are changed according to the flight instructions sent by the operator, the flight control field and the related field thereof are difficult to distinguish from the completely random field in the step 2), but because the time interval of the data packets of the unmanned plane flight control protocol is generally short, tens of packets are often sent every second, the frequency of the operator changing the flight command is generally low, and the operator often sends the same flight command within one second or even several seconds, therefore, the uncertainty of the flight control field and the related field in the local data is obviously reduced, the fragrance concentration entropy can reflect the uncertainty in a group of data, therefore, the fragrance concentration entropy of local data in the flight control field and the related field is obviously reduced, and the local fragrance concentration entropy is still larger for a completely random field. Because different flight instructions are likely to be controlled by different bits, according to the number of different flight instructions sent by a manipulator, the numerical value change rate characteristics of the different bits have larger difference, the numerical randomness in a completely random field is extremely large, and the numerical value change rate characteristic of each bit is also random, so that the numerical value change rate is taken as a statistical characteristic, the continuous flight control field and the completely random field are difficult to be correctly divided, the information entropy of local data is taken as the statistical characteristic, the differences of the flight control field, related fields and the completely random field can be reflected essentially, and the accuracy of the division of the continuous flight control field and the completely random field is further effectively improved. Then according to the formula
Figure GDA0002963051610000082
Computing a set Wi,zEntropy of aroma Ci,zWill SiIn each group Si,zC of (A)i,zForm a set G of fragrance concentration entropyiWherein t is Wi,zP (x) is the set Wi,zThe probability of x occurrence in (2);
step 4d) clustering all C using KMeans algorithmi,zClustering to obtain a sum entropy center with large central valueThe two types with small values are used, the type with a large central value of the aroma concentration entropy is used as a completely random type A, the type with a small central value of the aroma concentration entropy is used as a flight control related type B, in the example, the cluster number K is 2, the Euclidean distance is used as a distance measurement standard, and clustering is repeated until the central values of the two types of aroma concentration entropies do not change any more;
step 4e) reaction of GiIn satisfy Ci,zThe number of elements belonging to the group of A is GiThe ratio of the total number of elements in the formula is represented by wiAnd all satisfy wiI more than or equal to N forms a complete random field bit number set RT, and the rest forms a flight control related field bit number set FC;
step 5) acquiring all field separation points:
and adding all i which satisfy that i and i +1 do not belong to the set RT or the set FC or the set L at the same time into the separation point digit set E, and finally, all elements in the set E are all field separation points.
The final field division result of the embodiment is completely consistent with the result obtained by analyzing the function for constructing the data packet in the unmanned aerial vehicle APP.
The above description is only one specific example of the present invention and should not be construed as limiting the invention in any way. It will be apparent to persons skilled in the relevant art(s) that various modifications and changes in form and detail can be made therein without departing from the principles and arrangements of the invention, but these modifications and changes based on the inventive concept are also within the scope of the invention as defined in the appended claims.

Claims (3)

1. An unmanned aerial vehicle flight control protocol field division method based on an information theory is characterized by comprising the following steps:
(1) preprocessing an unmanned aerial vehicle flight control protocol data set:
(1a) collecting M binary flight control protocol data packets in a time range of T, converting the M binary flight control protocol data packets into hexadecimal data, wherein each hexadecimal flight control protocol data packet comprises h hexadecimal data, T is more than 10min, M is more than 10000, and h is more than or equal to 1;
(1b) m pieces of data are collected according to the sequence of binary flight control protocol data packetsThe hexadecimal flight control protocol data packets are arranged into a hexadecimal flight control data set D, D ═ D1,D2,...,Dj,...,DM},DjIndicating the jth data packet, Dj={d1,j,d2,j,...,di,j,...,dh,j},di,jRepresents the hexadecimal data in the jth data packet at the ith bit, and the value is expressed as | di,jI, the i-th hexadecimal data in each hexadecimal flight control protocol data packet form a hexadecimal data set SiWherein i is more than or equal to 1 and less than or equal to h, and j is more than or equal to 1 and less than or equal to M;
(1c) when j is less than or equal to m, adding SiMiddle data di,jComposing a hexadecimal data set X1,iAnd will | di,jL constitutes the hexadecimal value set X'1,iWill SiThe rest of data di,jComposing a hexadecimal data set X2,iAnd will | di,jL constitutes the hexadecimal value set X'2,iWherein, in the step (A),
Figure FDA0002963051600000011
Figure FDA0002963051600000012
represents rounding down;
(2) acquiring a regular field bit number set L and a random field bit number set R based on an information theory:
(2a) setting a threshold value V, constructing a set HEX containing 16 hexadecimal values, wherein the u-th element in the HEX is represented as HEX, and the u-th element is represented as HEX {0,1,2,3,4,5,6,7,8,9, a, b, c, d, e and f }u
(2b) When d isi,j∈X1,iThen all will satisfy | di,j-1|=HEXuD ofi,j| constitutes a set of hexadecimal values I1,i,uWhen d isi,j∈X2,iThen all will satisfy | di,j-1|=HEXuD ofi,j| constitutes a set of hexadecimal values I2,i,u
(2c) By means of the set X1,iAnd set I1,i,uCalculating X'1,iD ini,j-1I and | di,jConditional entropy between | H1,iBy means of the set X2,iAnd set I2,i,uCalculating X'2,iD ini,j-1I and | di,jConditional entropy between | H2,iAnd will satisfy
Figure FDA0002963051600000021
All i form a regular field bit number set L, and the rest i form a random field bit number set R;
(3) acquiring a separation point bit number set E of a regular field bit number set L based on an information theory:
(3a) when d isi,j∈X1,iAnd i, i +1 ∈ L, all will satisfy | di-1,j|=HEXuD ofi,jL constitutes the hexadecimal value set I'1,i,uWhen d isi,j∈X2,iAnd i, i +1 ∈ L, all will satisfy | di-1,j|=HEXuD ofi,jL constitutes the hexadecimal value set I'2,i,u
(3b) By means of the set X1,iAnd aggregate I'1,i,uCalculating X'1,i-1D ini-1,jL and X'1,iD ini,jConditional entropy between l H'1,iBy means of the set X2,iAnd aggregate I'2,i,uCalculating X'2,i-1D ini-1,jL and X'2,iD ini,jConditional entropy between l H'2,iAnd will satisfy
Figure FDA0002963051600000022
All i of (a) form a separation point digit set E;
(4) dividing a random field bit number set R based on an information theory:
(4a) setting a threshold value N;
(4b) when i ∈ R, the number of strips
Figure FDA0002963051600000024
As a unit, adding SiThe medium data are divided into f groups, Si={Si,1,Si,2,...,Si,z,...,Si,f},Wherein Si,zDenotes SiWhen d is the group z data ofi,j∈Si,zWhen, will | di,j| constitute a set of hexadecimal values Wi,zWherein
Figure FDA0002963051600000025
Figure FDA0002963051600000026
Represents rounding down;
(4c) computing a set Wi,zEntropy of aroma concentration C of each elementi,zAnd then S isiIn each group Si,zC of (A)i,zForm a set G of fragrance concentration entropyi
(4d) All C's were clustered using KMeans algorithmi,zClustering into two types of large central value and small central value of the fragrance concentration entropy, taking the type of large central value of the fragrance concentration entropy as a completely random type A, and taking the type of small central value of the fragrance concentration entropy as a flight control related type B;
(4e) g is to beiIn satisfy Ci,zThe number of elements belonging to the group of A is GiThe ratio of the total number of elements in the formula is represented by wiAnd will all satisfy iw ≥NI of (2) forms a complete random field bit number set RT, and the rest forms a flight control related field bit number set FC;
(5) acquiring all field separation points:
and adding all i which satisfy that i and i +1 do not belong to the set RT or the set FC or the set L at the same time into the separation point digit set E, and finally, all elements in the set E are all field separation points.
2. The method for partitioning fields of the flight control protocol of unmanned aerial vehicle based on information theory as claimed in claim 1, wherein the step (2c) is to calculate X1,iD ini,j-1I and | di,jConditional entropy between | H1,iCalculating X2,iD ini,j-1I and | di,jConditional entropy between | H2,iThe calculation of X as described in step (3b)1,i-1D ini-1,jI and X1,iD ini,jConditional entropy between l H'1,iCalculating X2,i-1D ini-1,jI and X2,iD ini,jConditional entropy between l H'2,iThe calculation formulas are respectively as follows:
Figure FDA0002963051600000031
Figure FDA0002963051600000032
Figure FDA0002963051600000033
Figure FDA0002963051600000034
wherein X is X't,iP (X) is X't,iProbability of occurrence of x in (2)1Is I1,i,uAll first occurring elements in (A), p (y)1| x) is HEXuWhen x is equal to I1,i,uY in the set1Probability of occurrence, y2Is I2,i,uAll first occurring elements in (A), p (y)2| x) is HEXuWhen x is equal to I2,i,uY in the set2Probability of occurrence, y'1Is l'1,i,uAll of the first occurring elements of (a), p (y'1| x) is HEXuX is'1,i,uY 'in the set'1Probability of occurrence, y'2Is l'2,i,uAll of the first occurring elements of (a), p (y'2| x) is HEXuX is'2,i,uY 'in the set'2The probability of occurrence.
3. The UAV flight control protocol field according to claim 1The method of partitioning, wherein the set of computations W described in step (4c) isi,zEntropy of aroma concentration C of each elementi,zThe expression is as follows:
Figure FDA0002963051600000041
wherein t is Wi,zP (x) is the set Wi,zProbability of x occurrence in (c).
CN201910822782.XA 2019-09-02 2019-09-02 Unmanned aerial vehicle flight control protocol field division method based on information theory Active CN110602073B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910822782.XA CN110602073B (en) 2019-09-02 2019-09-02 Unmanned aerial vehicle flight control protocol field division method based on information theory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910822782.XA CN110602073B (en) 2019-09-02 2019-09-02 Unmanned aerial vehicle flight control protocol field division method based on information theory

Publications (2)

Publication Number Publication Date
CN110602073A CN110602073A (en) 2019-12-20
CN110602073B true CN110602073B (en) 2021-05-18

Family

ID=68856929

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910822782.XA Active CN110602073B (en) 2019-09-02 2019-09-02 Unmanned aerial vehicle flight control protocol field division method based on information theory

Country Status (1)

Country Link
CN (1) CN110602073B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1315356A3 (en) * 2001-11-24 2006-03-22 Lg Electronics Inc. Method for transmitting packet data in compressed form in a communication system
CN103546443A (en) * 2012-07-16 2014-01-29 清华大学 Method for reversely analyzing network protocols by means of combining network traffic analysis with message clustering
CN108880929A (en) * 2018-05-24 2018-11-23 浙江大学 A kind of communication protocol extracting method towards the civilian no-manned machine distant control chain circuit of microminiature
CN109040081A (en) * 2018-08-10 2018-12-18 哈尔滨工业大学(威海) A kind of protocol fields conversed analysis system and method based on BWT
CN109462590A (en) * 2018-11-15 2019-03-12 成都网域复兴科技有限公司 A kind of unknown protocol conversed analysis method based on fuzz testing
CN109951464A (en) * 2019-03-07 2019-06-28 西安电子科技大学 The sequence of message clustering method of unknown binary system proprietary protocol

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1315356A3 (en) * 2001-11-24 2006-03-22 Lg Electronics Inc. Method for transmitting packet data in compressed form in a communication system
CN103546443A (en) * 2012-07-16 2014-01-29 清华大学 Method for reversely analyzing network protocols by means of combining network traffic analysis with message clustering
CN108880929A (en) * 2018-05-24 2018-11-23 浙江大学 A kind of communication protocol extracting method towards the civilian no-manned machine distant control chain circuit of microminiature
CN109040081A (en) * 2018-08-10 2018-12-18 哈尔滨工业大学(威海) A kind of protocol fields conversed analysis system and method based on BWT
CN109462590A (en) * 2018-11-15 2019-03-12 成都网域复兴科技有限公司 A kind of unknown protocol conversed analysis method based on fuzz testing
CN109951464A (en) * 2019-03-07 2019-06-28 西安电子科技大学 The sequence of message clustering method of unknown binary system proprietary protocol

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Automatic Reverse Engineering of Private Flight Control Protocols of UAVs";Ran Ji等;《Serurity and Communication Networks》;20170704;全文 *

Also Published As

Publication number Publication date
CN110602073A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
EP3407562A1 (en) Coflow recognition method and system, and server using method
WO2021052394A1 (en) Model training method, apparatus, and system
EP4009590A1 (en) Traffic abnormality detection method, and model training method and apparatus
CN109150859B (en) Botnet detection method based on network traffic flow direction similarity
CN112822189A (en) Traffic identification method and device
CN111176953B (en) Abnormality detection and model training method, computer equipment and storage medium
CN112367303B (en) Distributed self-learning abnormal flow collaborative detection method and system
CN105376193A (en) Intelligent association analysis method and intelligent association analysis device for security events
CN116055413B (en) Tunnel network anomaly identification method based on cloud edge cooperation
US20210065021A1 (en) Working condition state modeling and model correcting method
CN100352208C (en) Detection and defence method for data flous of large network station
CN112395608A (en) Network security threat monitoring method, device and readable storage medium
CN108683658A (en) Industry control network Traffic Anomaly recognition methods based on more RBM network structions benchmark models
CN110851414B (en) Method and system for analyzing boundary data by clustering method
CN110602073B (en) Unmanned aerial vehicle flight control protocol field division method based on information theory
CN116684878B (en) 5G information transmission data safety monitoring system
CN112383488A (en) Content identification method suitable for encrypted and non-encrypted data streams
CN112422546A (en) Network anomaly detection method based on variable neighborhood algorithm and fuzzy clustering
CN106550387B (en) A kind of wireless sensor network routing layer QoS evaluating method
CN116170212A (en) IoT malicious traffic detection device against concept drift
CN116170208A (en) Network intrusion real-time detection method based on semi-supervised ISODATA algorithm
CN116827873A (en) Encryption application flow classification method and system based on local-global feature attention
CN115392710A (en) Wind turbine generator operation decision method and system based on data filtering
CN115473688A (en) Software defined network-oriented anomaly detection method, device and equipment
CN111586052B (en) Multi-level-based crowd sourcing contract abnormal transaction identification method and identification system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant