Netinfo Security ›› 2015, Vol. 15 ›› Issue (7): 26-31.doi: 10.3969/j.issn.1671-1122.2015.07.005
• Orginal Article • Previous Articles Next Articles
WANG Jing-zhong, WANG Wei-meng()
Received:
2015-06-04
Online:
2015-07-01
Published:
2015-07-28
CLC Number:
WANG Jing-zhong, WANG Wei-meng. Research on FTP Protocol Identification Method Based on Tagged Word[J]. Netinfo Security, 2015, 15(7): 26-31.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.07.005
[1] | 李彩秋,周亚建,魏更宇. FTP协议信息隐藏方法的研究与进步[J].计算机工程与应用, 2013,(21):111-113. |
[2] | 刘旭. 计算机网络通信协议探析[J].科技创新导报, 2012,(11):33. |
[3] | 朱婷婷,徐平平,张苏横. 应用层流量识别方法的设计与实现[J].军事通信技术, 2010,(2):53-58. |
[4] | 吴鹏冲,任亚宁,黄小红,等.非默认端口的FTP协议识别[EB/OL].,2008-09-04. |
[5] | 陈创新. 应用层网络协议的识别机制与软件实现[D]. 北京:北京交通大学,2012. |
[6] | 林楠. 应用协议的规则提取及优化策略[D]. 北京:北京交通大学,2011. |
[7] | 梁秀花. 浅谈FTP协议在网络传输中的应用[J].计算机光盘软件与应用, 2014,(14):137-138. |
[8] | Bucher Gruppe.FTP[R]. Laun GmbH,2011. |
[9] | 王岩. 应用层协议识别技术研究[D]. 西安:西安电子科技大学,2012. |
[10] | 杨玉玺. 应用层协议识别引擎的设计与实现[D]. 重庆:重庆大学,2013. |
[11] | 周宏生. 基于FTP协议的文件上传与下载[J].科技资讯, 2006,(2):5-6. |
[12] | 黄世权. FTP协议分析和安全研究[J].微计算机信息, 2008,(6):93-95. |
[13] | 陈献庆. 应用层协议过滤系统设计与实现[D]. 成都:电子科技大学,2010. |
[14] | 杨化志. 应用层协议识别和还原方法的研究与实现[D]. 苏州:苏州大学,2011. |
[15] | 陈佩. 主成分分析法研究及其在特征提取中的应用[D]. 西安:陕西师范大学,2014. |
[16] | 李友坤. BP神经网络的研究分析及改进应用[D]. 淮南:安徽理工大学,2012. |
[17] | 王昱. BP神经网络研究[J].现代计算机(专业版),2010,(12):13-15. |
[18] | 蔡艳丽. 基于FTP协议网络流量模拟的设计与实现[J].海军航空工程学院学报, 2014,(3):221-224. |
[1] | HUANG Wangwang, ZHOU Hua, WANG Daiqiang, ZHAO Qi. Design of Reconfigurable Key Security Authentication Protocol for IoT Based on National Cryptography SM9 [J]. Netinfo Security, 2024, 24(7): 1006-1014. |
[2] | ZHANG Xiaojun, ZHANG Nan, HAO Yunpu, WANG Zhouyang, XUE Jingting. Three-Factor Authentication and Key Agreement Protocol Based on Chaotic Map for Industrial Internet of Things Systems [J]. Netinfo Security, 2024, 24(7): 1015-1026. |
[3] | ZHANG Jiwei, WANG Wenjun, NIU Shaozhang, GUO Xiangkuo. Blockchain Scaling Solutions: ZK-Rollup Review [J]. Netinfo Security, 2024, 24(7): 1027-1037. |
[4] | ZHANG Liqiang, LU Mengjun, YAN Fei. A Cross-Contract Fuzzing Scheme Based on Function Dependencies [J]. Netinfo Security, 2024, 24(7): 1038-1049. |
[5] | DONG Yunyun, ZHU Yuling, YAO Shaowen. High-Quality Full-Size Image Steganography Method Based on Improved U-Net and Hybrid Attention Mechanism [J]. Netinfo Security, 2024, 24(7): 1050-1061. |
[6] | ZHOU Shucheng, LI Yang, LI Chuanrong, GUO Lulu, JIA Xinhong, YANG Xinghua. Context-Based Abnormal Root Cause Algorithm [J]. Netinfo Security, 2024, 24(7): 1062-1075. |
[7] | REN Changyu, ZHANG Ling, JI Hangyuan, YANG Liqun. Research on TTP Extraction Method Based on Pre-Trained Language Model and Chinese-English Threat Intelligence [J]. Netinfo Security, 2024, 24(7): 1076-1087. |
[8] | CAI Manchun, XI Rongkang, ZHU Yi, ZHAO Zhongbin. A Fingerprint Identification Method of Multi-Page and Multi-Tag Targeting Tor Website [J]. Netinfo Security, 2024, 24(7): 1088-1097. |
[9] | XIANG Hui, XUE Yunhao, HAO Lingxin. Large Language Model-Generated Text Detection Based on Linguistic Feature Ensemble Learning [J]. Netinfo Security, 2024, 24(7): 1098-1109. |
[10] | SHEN Xiuyu, JI Weifeng. Optimization of Cost of Edge-Cloud Collaborative Computing Offloading Considering Security [J]. Netinfo Security, 2024, 24(7): 1110-1121. |
[11] | ZHAO Xinqiang, FAN Bo, ZHANG Dongju. Research on APT Attack Defense System Based on Threat Discovery [J]. Netinfo Security, 2024, 24(7): 1122-1128. |
[12] | WEN Wen, LIU Qinju, KUANG Lin, REN Xuejing. Research and Scheme Design of Cyber Threat Intelligence Sharing under Privacy Protection System [J]. Netinfo Security, 2024, 24(7): 1129-1137. |
[13] | LIU Yidan, MA Yongliu, DU Yibin, CHENG Qingfeng. A Certificateless Anonymous Authentication Key Agreement Protocol for VANET [J]. Netinfo Security, 2024, 24(7): 983-992. |
[14] | LUO Ming, ZHAN Qibang, QIU Minrong. A Heterogeneous Cross-Domain Conditional Privacy Protection Ring Signcryption Scheme for V2I Communication [J]. Netinfo Security, 2024, 24(7): 993-1005. |
[15] | LI Zengpeng, WANG Siyang, WANG Mei. Research of Privacy-Preserving Proximity Test [J]. Netinfo Security, 2024, 24(6): 817-830. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||