Inferring Protocol State Machine from Network Traces: A Probabilistic Approach
暂无分享,去创建一个
Li Guo | Yipeng Wang | Danfeng Yao | Zhibin Zhang | Buyun Qu | D. Yao | Li Guo | Yipeng Wang | Zhibin Zhang | Buyun Qu
[1] Ali S. Hadi,et al. Finding Groups in Data: An Introduction to Chster Analysis , 1991 .
[2] P. Jaccard. THE DISTRIBUTION OF THE FLORA IN THE ALPINE ZONE.1 , 1912 .
[3] Zhenkai Liang,et al. Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation , 2007, USENIX Security Symposium.
[4] Thomas W. Reps,et al. Extracting Output Formats from Executables , 2006, 2006 13th Working Conference on Reverse Engineering.
[5] Francisco Casacuberta,et al. Probabilistic finite-state machines - part I , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[6] Stefan Savage,et al. Unexpected means of protocol inference , 2006, IMC '06.
[7] Niccolo Cascarano,et al. GT: picking up the truth from the ground for internet traffic , 2009, CCRV.
[8] 田端 利宏,et al. Network and Distributed System Security Symposiumにおける研究動向の調査 , 2004 .
[9] Marc Dacier,et al. ScriptGen: an automated script generation tool for Honeyd , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[10] Helen J. Wang,et al. Generic Application-Level Protocol Analyzer and its Language , 2007, NDSS.
[11] Zhenkai Liang,et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.
[12] J. Dunn. Well-Separated Clusters and Optimal Fuzzy Partitions , 1974 .
[13] Patrick Haffner,et al. ACAS: automated construction of application signatures , 2005, MineNet '05.
[14] M. Kendall,et al. Kendall's advanced theory of statistics , 1995 .
[15] Christopher Krügel,et al. Prospex: Protocol Specification Extraction , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[16] Dawn Xiaodong Song,et al. Fig: Automatic Fingerprint Generation , 2007, NDSS.
[17] Anja Feldmann,et al. Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection , 2006, USENIX Security Symposium.
[18] Helen J. Wang,et al. Discoverer: Automatic Protocol Reverse Engineering from Network Traces , 2007, USENIX Security Symposium.
[19] Vern Paxson,et al. Semi-automated discovery of application session structure , 2006, IMC '06.