Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining

This paper analyzes the typical abnormal behaviors such as hidden and invisible attacks of network protocols and proposes a new method to perceive and mine the abnormal behaviors of protocols so as to evaluate the operational security of protocols. Aiming at the problems of long latency and difficul...

Full description

Saved in:
Bibliographic Details
Main Author: Xiaoyan Xu
Format: Article
Language:English
Published: Wiley 2022-01-01
Series:Discrete Dynamics in Nature and Society
Online Access:http://dx.doi.org/10.1155/2022/7276756
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832568028343042048
author Xiaoyan Xu
author_facet Xiaoyan Xu
author_sort Xiaoyan Xu
collection DOAJ
description This paper analyzes the typical abnormal behaviors such as hidden and invisible attacks of network protocols and proposes a new method to perceive and mine the abnormal behaviors of protocols so as to evaluate the operational security of protocols. Aiming at the problems of long latency and difficulty to expose the hidden behavior of network protocols, a scheme combining dynamic stain analysis and instruction clustering analysis is proposed. The proposed method cannot only quickly distinguish the hidden behavior but also accurately grasp the hidden behavior instruction sequence. Experimentation results show that the proposed method can mine unknown protocols for abnormal behavior with high accuracy.
format Article
id doaj-art-c50bd09e5192417586d23ecf29afc38f
institution Kabale University
issn 1607-887X
language English
publishDate 2022-01-01
publisher Wiley
record_format Article
series Discrete Dynamics in Nature and Society
spelling doaj-art-c50bd09e5192417586d23ecf29afc38f2025-02-03T00:59:54ZengWileyDiscrete Dynamics in Nature and Society1607-887X2022-01-01202210.1155/2022/7276756Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual MiningXiaoyan Xu0School of Information and Control EngineeringThis paper analyzes the typical abnormal behaviors such as hidden and invisible attacks of network protocols and proposes a new method to perceive and mine the abnormal behaviors of protocols so as to evaluate the operational security of protocols. Aiming at the problems of long latency and difficulty to expose the hidden behavior of network protocols, a scheme combining dynamic stain analysis and instruction clustering analysis is proposed. The proposed method cannot only quickly distinguish the hidden behavior but also accurately grasp the hidden behavior instruction sequence. Experimentation results show that the proposed method can mine unknown protocols for abnormal behavior with high accuracy.http://dx.doi.org/10.1155/2022/7276756
spellingShingle Xiaoyan Xu
Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining
Discrete Dynamics in Nature and Society
title Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining
title_full Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining
title_fullStr Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining
title_full_unstemmed Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining
title_short Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining
title_sort dynamic analysis of network protocol hiding behavior based on perceptual mining
url http://dx.doi.org/10.1155/2022/7276756
work_keys_str_mv AT xiaoyanxu dynamicanalysisofnetworkprotocolhidingbehaviorbasedonperceptualmining