期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
EDSM-Based Binary Protocol State Machine Reversing
1
作者 Shen Wang Fanghui Sun +3 位作者 Hongli Zhang Dongyang Zhan Shuang Li Jun Wang 《Computers, Materials & Continua》 SCIE EI 2021年第12期3711-3725,共15页
Internet communication protocols define the behavior rules of network components when they communicate with each other.With the continuous development of network technologies,many private or unknown network protocols ... Internet communication protocols define the behavior rules of network components when they communicate with each other.With the continuous development of network technologies,many private or unknown network protocols are emerging in endlessly various network environments.Herein,relevant protocol specifications become difficult or unavailable to translate in many situations such as network security management and intrusion detection.Although protocol reverse engineering is being investigated in recent years to perform reverse analysis on the specifications of unknown protocols,most existing methods have proven to be time-consuming with limited efficiency,especially when applied on unknown protocol state machines.This paper proposes a state merging algorithm based on EDSM(Evidence-Driven State Merging)to infer the transition rules of unknown protocols in form of state machines with high efficiency.Compared with another classical state machine inferring method based on Exbar algorithm,the experiment results demonstrate that our proposed method could run faster,especially when dealing with massive training data sets.In addition,this method can also make the state machines have higher similarities with the reference state machines constructed from public specifications. 展开更多
关键词 Network security protocol state machine EDSM algorithm protocol reverse engineering protocol analyzing
在线阅读 下载PDF
Test Data Generation for Stateful Network Protocol Fuzzing Using a Rule-Based State Machine 被引量:14
2
作者 Rui Ma Daguang Wang +2 位作者 Changzhen Hu Wendong Ji Jingfeng Xue 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期352-360,共9页
To improve the efficiency and coverage of stateful network protocol fuzzing, this paper proposes a new method, using a rule-based state machine and a stateful rule tree to guide the generation of fuzz testing data. Th... To improve the efficiency and coverage of stateful network protocol fuzzing, this paper proposes a new method, using a rule-based state machine and a stateful rule tree to guide the generation of fuzz testing data. The method first builds a rule-based state machine model as a formal description of the states of a network protocol. This removes safety paths, to cut down the scale of the state space. Then it uses a stateful rule tree to describe the relationship between states and messages, and then remove useless items from it. According to the message sequence obtained by the analysis of paths using the stateful rule tree and the protocol specification, an abstract data model of test case generation is defined. The fuzz testing data is produced by various generation algorithms through filling data in the fields of the data model. Using the rule-based state machine and the stateful rule tree, the quantity of test data can be reduced. Experimental results indicate that our method can discover the same vulnerabilities as traditional approaches, using less test data, while optimizing test data generation and improving test efficiency. 展开更多
关键词 FUZZING stateful network protocol test data generation rule-based state machine stateful rule tree
原文传递
Event-based Control and Filtering of Networked Systems:A Survey 被引量:7
3
作者 Lei Zou Zi-Dong Wang Dong-Hua Zhou 《International Journal of Automation and computing》 EI CSCD 2017年第3期239-253,共15页
In recent years, theoretical and practical research on event-based communication strategies has gained considerable research attention due primarily to their irreplaceable superiority in resource-constrained systems(... In recent years, theoretical and practical research on event-based communication strategies has gained considerable research attention due primarily to their irreplaceable superiority in resource-constrained systems(especially networked systems). For networked systems, event-based transmission scheme is capable of improving the efficiency in resource utilization and prolonging the lifetime of the network components compared with the widely adopted periodic transmission scheme. As such, it would be interesting to 1) examining how the event-triggering mechanisms affect the control or filtering performance for networked systems, and 2) developing some suitable approaches for the controller and filter design problems. In this paper, a bibliographical review is presented on event-based control and filtering problems for various networked systems. First, the event-driven communication scheme is introduced in detail according to its engineering background, characteristic, and representative research frameworks. Then, different event-based control and filtering(or state estimation) problems are categorized and then discussed. Finally, we conclude the paper by outlining future research challenges for event-based networked systems. 展开更多
关键词 Event-triggered transmission networked systems event-based control event-based filtering event-triggered distributed state estimation distributed control with event-based protocol
原文传递
Active inference of protocol state machines from incomplete message domains
4
作者 Maohua GUO Yuefei ZHU Jinlong FEI 《Frontiers of Information Technology & Electronic Engineering》 2025年第12期2529-2549,共21页
Inferring protocol state machines from observable information presents a significant challenge in protocol reverse engineering(PRE),especially when passively collected traffic suffers from message loss,resulting in an... Inferring protocol state machines from observable information presents a significant challenge in protocol reverse engineering(PRE),especially when passively collected traffic suffers from message loss,resulting in an incomplete protocol state space.This paper introduces an innovative method for actively inferring protocol state machines using the minimally adequate teacher(MAT)framework.By incorporating session completion and deterministic mutation techniques,this method broadens the range of protocol messages,thereby constructing a more comprehensive input space for the protocol state machine from an incomplete message domain.Additionally,the efficiency of active inference is improved through several optimizations for the L_(M)^(+)algorithm,including traffic deduplication,the construction of an expanded prefix tree acceptor(EPTA),query optimization based on responses,and random counterexample generation.Experiments on the real-time streaming protocol(RTSP)and simple mail transfer protocol(SMTP),which use Live555 and Exim implementations across multiple versions,demonstrate that this method yields more comprehensive protocol state machines with enhanced execution efficiency.Compared to the L_(M)^(+) algorithm implemented by AALpy,Act_Infer achieves an average reduction of approximately 40.7%in execution time and significantly reduces the number of connections and interactions by approximately 28.6%and 46.6%,respectively. 展开更多
关键词 protocol reverse engineering(PRE) protocol state machine Active inference Incomplete message domains Input space
原文传递
Routing protocol for wireless quantum multi-hop mesh backbone network based on partially entangled GHZ state 被引量:3
5
作者 Pei-Ying Xiong Xu-Tao Yu +2 位作者 Zai-Chen Zhang Hai-Tao Zhan Jing-Yu Hua 《Frontiers of physics》 SCIE CSCD 2017年第4期187-196,共10页
Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multi- hop teleportation for wi... Quantum multi-hop teleportation is important in the field of quantum communication. In this study, we propose a quantum multi-hop communication model and a quantum routing protocol with multi- hop teleportation for wireless mesh backbone networks. Based on an analysis of quantum multi-hop protocols, a partially entangled Greenberger-Horne-Zeilinger (GHZ) state is selected as the quantum channel for the proposed protocol. Both quantum and classical wireless channels exist between two neighboring nodes along the route. With the proposed routing protocol, quantum information can be transmitted hop by hop from the source node to the destination node. Based on multi-hop telepor- tation based on the partially entangled GHZ state, a quantum route established with the minimum number of hops. The difference between our routing protocol and the classical one is that in the for- mer, the processes used to find a quantum route and establish quantum channel entanglement occur simultaneously. The Bell state measurement results of each hop are piggybacked to quantum route finding information. This method reduces the total number of packets and the magnitude of air inter- face delay. The deduction of the establishment of a quantum channel between source and destination is also presented here. The final success probability of quantum multi-hop teleportation in wireless mesh backbone networks was simulated and analyzed. Our research shows that quantum multi-hop teleportation in wireless mesh backbone networks through a partially entangled GHZ state is feasible. 展开更多
关键词 wireless mesh backbone network multi-hop teleportation partially entangled GHZ state quantum routing protocol
原文传递
Chip-integrated quantum signature network over 200 km 被引量:1
6
作者 Yongqiang Du Bing-Hong Li +7 位作者 Xin Hua Xiao-Yu Cao Zhengeng Zhao Feng Xie Zhenrong Zhang Hua-Lei Yin Xi Xiao Kejin Wei 《Light: Science & Applications》 2025年第4期1061-1069,共9页
The development of quantum networks is paramount towards practical and secure communications.Quantum digital signatures(QDS)offer an information-theoretically secure solution for ensuring data integrity,authenticity,a... The development of quantum networks is paramount towards practical and secure communications.Quantum digital signatures(QDS)offer an information-theoretically secure solution for ensuring data integrity,authenticity,and nonrepudiation,rapidly growing from proof-of-concept to robust demonstrations.However,previous QDS systems relied on expensive and bulky optical equipment,limiting large-scale deployment and reconfigurable networking construction.Here,we introduce and verify a chip-based QDS network,placing the complicated and expensive measurement devices in the central relay while each user needs only a low-cost transmitter.We demonstrate the network with a three-node setup using an integrated encoder chip and decoder chip.By developing a 1-decoy-state one-time universal hashing-QDS protocol,we achieve a maximum signature rate of 0.0414 times per second for a 1 Mbit messages over fiber distances up to 200 km,surpassing all current state-of-the-art QDS experiments.This study validates the feasibility of chip-based QDS,paving the way for large-scale deployment and integration with existing fiber infrastructure. 展开更多
关键词 secure communications quantum networks chip based network large scale deployment digital signatures qds offer quantum digital signatures fiber distances decoy state protocol
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部