|
|
Bit Stream Oriented Enumeration Tree Pruning Algorithm |
QIU Wei-dong 1(邱卫东), JIN Ling1 (金 凌), YANG Xiao-niu 2(杨小牛), YANG Hong-wa 2(杨红娃)
|
(1. School of Information Security Engineering, Shanghai Jiaotong University,
Shanghai 200240, China;
2. National Science and Technology on Communication Information
Security Control Laboratory, No. 36 Institute of China Electronics Technology Group Corporation, Jiaxing 314033, Zhejiang, China)
(1. School of Information Security Engineering, Shanghai Jiaotong University,
Shanghai 200240, China;
2. National Science and Technology on Communication Information
Security Control Laboratory, No. 36 Institute of China Electronics Technology Group Corporation, Jiaxing 314033, Zhejiang, China)
|
|
|
Abstract Abstract: Packet analysis is very important in our digital life. But
what protocol analyzers can do is limited because they can only process data
in determined format. This paper puts forward a solution to decode raw
data in an unknown format. It is certain that data can be cut into packets
because there are usually characteristic bit sequences in packet headers.
The key to solve the problem is how to find out those characteristic
sequences. We present an efficient way of bit sequence enumeration. Both
Aho-Corasick (AC) algorithm and data mining method are used to reduce the
cost of the process.
|
Received: 10 March 2011
Published: 29 October 2011
|
|
Corresponding Authors:
QIU Wei-dong (邱卫东),
E-mail: qiuwd@sjtu.edu.cn
|
|
|
|
[1] |
CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非), WANG Yong-tao (王永涛). Identity-Based Key-Insulated Proxy Signature Without Random Oracles[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 557-566. |
[2] |
WAN Zhong-mei (万中美), Meng Xiang-qin (孟祥芹), HONG Xuan (洪 璇). Certificateless Strong Key-Insulated Signature Without Random Oracles[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 571-576. |
[3] |
TSO Ray-lin (左瑞麟), KIM Cheonshik, YI Xun (易 训). Certificateless Message Recovery Signatures Providing Girault's Level-3 Security[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 577-585. |
[4] |
CHIEN Hung-yu (简宏宇), YEH Ming-kuei (叶明贵), WU Tzong-chen (吴宗成), LEE Chin-i (李静怡). Comments on Enhanced Yoking Proof Protocols for Radio Frequency
Identification Tags and Tag Groups[J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 604-609. |
|
|
|
|