Identification Scheme of P2P Encryption Protocol Based on Reverse Analysis
暂无分享,去创建一个
Aiming at the problem of encryption protocol identification,a protocol identification scheme based on reverse analysis is proposed. In the scheme,the communication process and protocol structure in program level are analyzed,and the combined with characteristics of flow for identification. At last,take Thunder for test,the results demonstrate the effectiveness of the proposed method,and can be extended to other encryption protocols. The scheme can identify the encryption protocol in real time and accurately and control the flow better.