Bit Stream Oriented Enumeration Tree Pruning Algorithm
Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an unknown format. It is certain that data can be cut into packets because there are...
Saved in:
| Published in | Shanghai jiao tong da xue xue bao Vol. 16; no. 5; pp. 567 - 570 |
|---|---|
| Main Author | |
| Format | Journal Article |
| Language | English |
| Published |
Heidelberg
Shanghai Jiaotong University Press
01.10.2011
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1007-1172 1995-8188 |
| DOI | 10.1007/s12204-011-1190-8 |
Cover
| Abstract | Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an unknown format. It is certain that data can be cut into packets because there are usually characteristic bit sequences in packet headers. The key to solve the problem is how to find out those characteristic sequences. We present an efficient way of bit sequence enumeration. Both Aho-Corasick (AC) algorithm and data mining method are used to reduce the cost of the process. |
|---|---|
| AbstractList | Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an unknown format. It is certain that data can be cut into packets because there are usually characteristic bit sequences in packet headers. The key to solve the problem is how to find out those characteristic sequences. We present an efficient way of bit sequence enumeration. Both Aho-Corasick (AC) algorithm and data mining method are used to reduce the cost of the process. Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an unknown format. It is certain that data can be cut into packets because there are usually characteristic bit sequences in packet headers. The key to solve the problem is how to find out those characteristic sequences. We present an efficient way of bit sequence enumeration. Both Aho-Corasick (AC) algorithm and data mining method are used to reduce the cost of the process. |
| Author | 邱卫东 金凌 杨小牛 杨红娃 |
| AuthorAffiliation | School of Information Security Engineering, Shanghai Jiaotong University;National Science and Technology on Communication Information Security Control Laboratory, No. 36 Institute of China Electronics Technology Group Corporation |
| Author_xml | – sequence: 1 fullname: 邱卫东 金凌 杨小牛 杨红娃 |
| BookMark | eNp9kE9PwzAMxSM0JLbBB-BWblwKdpqm6XFM4480aUiMc5S1XtdpTbekPfDtydSJIydb8u_52W_CRra1xNg9whMCZM8eOQcRA2KMmEOsrtgY8zyNFSo1Cn2AwiTjN2zi_R5AQJLkYyZf6i766hyZJlq5mmxHZbSwfUPOdHVro7Ujij5db2tbRbND1bq62zW37HprDp7uLnXKvl8X6_l7vFy9fcxny7jgKFScoURp-NlN5ZtSpSSyQhpUlAmJZQ6QZkQGSGxhk2bhJAWl2hiZikKC5MmUPQ57j6499eQ73dS-oMPBWGp7rxEwbOZCYUBxQAvXeu9oq4-uboz7CZA-v6-HjHTISJ8z0ipo-KDxgbUVOb1ve2fDR_-KHi5Gu9ZWp6D7c0ryNOWYJMkvqXxzpw |
| Cites_doi | 10.1137/0206024 10.1023/B:DAMI.0000005258.31418.83 10.1145/170035.170072 10.1002/spe.4380211105 10.1145/360825.360855 |
| ContentType | Journal Article |
| Copyright | Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011 |
| Copyright_xml | – notice: Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011 |
| DBID | 2RA 92L CQIGP W92 ~WA AAYXX CITATION 7SC 7SP 7SR 7TB 7U5 8BQ 8FD FR3 JG9 JQ2 KR7 L7M L~C L~D |
| DOI | 10.1007/s12204-011-1190-8 |
| DatabaseName | 中文期刊服务平台 中文科技期刊数据库-CALIS站点 维普中文期刊数据库 中文科技期刊数据库-工程技术 中文科技期刊数据库- 镜像站点 CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts Mechanical & Transportation Engineering Abstracts Solid State and Superconductivity Abstracts METADEX Technology Research Database Engineering Research Database Materials Research Database ProQuest Computer Science Collection Civil Engineering Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Materials Research Database Civil Engineering Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts METADEX Computer and Information Systems Abstracts Professional Engineered Materials Abstracts Solid State and Superconductivity Abstracts Engineering Research Database Advanced Technologies Database with Aerospace |
| DatabaseTitleList | Materials Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Sciences (General) Engineering Architecture Computer Science |
| DocumentTitleAlternate | Bit Stream Oriented Enumeration Tree Pruning Algorithm |
| EISSN | 1995-8188 |
| EndPage | 570 |
| ExternalDocumentID | 10_1007_s12204_011_1190_8 39552133 |
| GroupedDBID | -5B -5G -BR -EM -Y2 -~C .86 .VR 06D 0R~ 0VY 188 1N0 29~ 2B. 2C0 2J2 2JN 2JY 2KG 2KM 2LR 2RA 2VQ 2~H 30V 4.4 406 408 40D 40E 5GY 5VR 5VS 6NX 8RM 8TC 92H 92I 92L 92R 93N 95- 95. 95~ 96X AAAVM AABHQ AAFGU AAHNG AAIAL AAJKR AANZL AARHV AARTL AATNV AATVU AAUYE AAWCG AAYFA AAYIU AAYQN AAYTO ABDZT ABECU ABFGW ABFTV ABHQN ABJNI ABJOX ABKAS ABKCH ABMNI ABMQK ABNWP ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABWNU ABXPI ACAOD ACBMV ACBRV ACBXY ACBYP ACGFS ACHSB ACHXU ACIGE ACIPQ ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPRK ACSNA ACTTH ACVWB ACWMK ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADMDM ADOXG ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFTE AEGAL AEGNC AEJHL AEJRE AEOHA AEPYU AESKC AESTI AETLH AEVLU AEVTX AEXYK AFGCZ AFLOW AFNRJ AFQWF AFRAH AFUIB AFWTZ AFZKB AGAYW AGDGC AGGBP AGJBK AGMZJ AGQMX AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIIXL AILAN AIMYW AITGF AJBLW AJDOV AJRNO AJZVZ AKQUC ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARMRJ AXYYD B-. BA0 BDATZ BGNMA CAG CCEZO CEKLB CHBEP COF CQIGP CS3 CSCUP CW9 DDRTE DNIVK DPUIP DU5 EBLON EBS EIOEI EJD ESBYG FA0 FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 HF~ HG6 HLICF HMJXF HRMNR HZ~ IJ- IKXTQ IWAJR IXC IXD I~X I~Z J-C JBSCW JZLTJ KOV LLZTM M4Y MA- NPVJJ NQJWS NU0 O9- O9J OK1 P9P PF0 PT4 QOS R89 R9I RIG ROL RPX RSV S16 S1Z S27 S3B SAP SCL SDH SEG SHX SISQX SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TCJ TGT TSG TSV TUC U2A UG4 UGNYK UNUBA UOJIU UTJUX UZ4 UZXMN VC2 VFIZW W48 W92 WK8 YLTOR Z7R Z7Z Z85 ZMTXR ~A9 ~WA -SC -S~ AACDK AAJBT AASML AAXDM AAYZH ABAKF ACDTI ACPIV AEFQL AEMSY AFBBN AGQEE AGRTI AIGIU CAJEC H13 Q-- SJYHP U1G U5M UY8 AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC AEZWR AFDZB AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION 7SC 7SP 7SR 7TB 7U5 8BQ 8FD FR3 JG9 JQ2 KR7 L7M L~C L~D |
| ID | FETCH-LOGICAL-c2148-71616a2004089bd85e47c6a18e7461d90057eea0e4f0b5703380d8ba654c60623 |
| IEDL.DBID | U2A |
| ISSN | 1007-1172 |
| IngestDate | Sun Aug 24 04:13:15 EDT 2025 Wed Oct 01 03:05:49 EDT 2025 Fri Feb 21 02:37:20 EST 2025 Wed Feb 14 09:55:08 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Keywords | association rule pattern matching frequent set TP 309 data mining frequent sequence |
| Language | English |
| License | http://www.springer.com/tdm |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c2148-71616a2004089bd85e47c6a18e7461d90057eea0e4f0b5703380d8ba654c60623 |
| Notes | Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format. This paper puts forward a solution to decode raw data in an unknown format. It is certain that data can be cut into packets because there are usually characteristic bit sequences in packet headers. The key to solve the problem is how to find out those characteristic sequences. We present an efficient way of bit sequence enumeration. Both Aho-Corasick (AC) algorithm and data mining method are used to reduce the cost of the process. pattern matching, data mining, frequent set, frequent sequence, association rule 31-1943/U ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
| PQID | 1010892481 |
| PQPubID | 23500 |
| PageCount | 4 |
| ParticipantIDs | proquest_miscellaneous_1010892481 crossref_primary_10_1007_s12204_011_1190_8 springer_journals_10_1007_s12204_011_1190_8 chongqing_primary_39552133 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20111000 |
| PublicationDateYYYYMMDD | 2011-10-01 |
| PublicationDate_xml | – month: 10 year: 2011 text: 20111000 |
| PublicationDecade | 2010 |
| PublicationPlace | Heidelberg |
| PublicationPlace_xml | – name: Heidelberg |
| PublicationTitle | Shanghai jiao tong da xue xue bao |
| PublicationTitleAbbrev | J. Shanghai Jiaotong Univ. (Sci.) |
| PublicationTitleAlternate | Journal of Shanghai Jiaotong university |
| PublicationYear | 2011 |
| Publisher | Shanghai Jiaotong University Press |
| Publisher_xml | – name: Shanghai Jiaotong University Press |
| References | Agrawal, Mielinsk, Swami (CR5) 1993 Han, Pei, Yin (CR4) 2004; 8 Hume, Sunday (CR1) 1991; 21 Knuth, Pratt (CR2) 1977; 6 Aho, Corasick (CR3) 1975; 18 D. E. Knuth (1190_CR2) 1977; 6 J. Han (1190_CR4) 2004; 8 A. Hume (1190_CR1) 1991; 21 R. Agrawal (1190_CR5) 1993 A. V. Aho (1190_CR3) 1975; 18 |
| References_xml | – volume: 6 start-page: 323 issue: 2 year: 1977 end-page: 350 ident: CR2 article-title: Fast pattern matching in strings [J] publication-title: SIAM Journal on Computing doi: 10.1137/0206024 – volume: 8 start-page: 53 issue: 1 year: 2004 end-page: 87 ident: CR4 article-title: Mining frequent patterns without candidate generation [J] publication-title: Data Mining and Knowledge Discovery doi: 10.1023/B:DAMI.0000005258.31418.83 – start-page: 207 year: 1993 end-page: 216 ident: CR5 article-title: Mining association rules between sets of items in large databases [C] publication-title: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data doi: 10.1145/170035.170072 – volume: 21 start-page: 1221 issue: 11 year: 1991 end-page: 1248 ident: CR1 article-title: Fast string searching [J] publication-title: Software: Practice and Experience doi: 10.1002/spe.4380211105 – volume: 18 start-page: 333 issue: 6 year: 1975 end-page: 340 ident: CR3 article-title: Efficient string matching: An aid to bibliographic search [J] publication-title: Communications of the ACM doi: 10.1145/360825.360855 – volume: 21 start-page: 1221 issue: 11 year: 1991 ident: 1190_CR1 publication-title: Software: Practice and Experience doi: 10.1002/spe.4380211105 – volume: 8 start-page: 53 issue: 1 year: 2004 ident: 1190_CR4 publication-title: Data Mining and Knowledge Discovery doi: 10.1023/B:DAMI.0000005258.31418.83 – volume: 18 start-page: 333 issue: 6 year: 1975 ident: 1190_CR3 publication-title: Communications of the ACM doi: 10.1145/360825.360855 – volume: 6 start-page: 323 issue: 2 year: 1977 ident: 1190_CR2 publication-title: SIAM Journal on Computing doi: 10.1137/0206024 – start-page: 207 volume-title: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data year: 1993 ident: 1190_CR5 doi: 10.1145/170035.170072 |
| SSID | ssj0040339 |
| Score | 1.8161442 |
| Snippet | Packet analysis is very important in our digital life. But what protocol analyzers can do is limited because they can only process data in determined format.... |
| SourceID | proquest crossref springer chongqing |
| SourceType | Aggregation Database Index Database Publisher |
| StartPage | 567 |
| SubjectTerms | Algorithms Architecture Computer Science Cost engineering Digital Electrical Engineering Engineering Enumeration Format Life Sciences Materials Science Packets (communication) Pruning Streams |
| Title | Bit Stream Oriented Enumeration Tree Pruning Algorithm |
| URI | http://lib.cqvip.com/qk/85391X/201105/39552133.html https://link.springer.com/article/10.1007/s12204-011-1190-8 https://www.proquest.com/docview/1010892481 |
| Volume | 16 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1995-8188 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0040339 issn: 1007-1172 databaseCode: AFBBN dateStart: 20080201 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1995-8188 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0040339 issn: 1007-1172 databaseCode: AGYKE dateStart: 20080101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1995-8188 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0040339 issn: 1007-1172 databaseCode: U2A dateStart: 20080201 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dT8IwEL8ovKiJCmoEldTEBz-yZF3btXtEIxKNPkmCT0u3dWAiAxn8_7ZjBTT64Ot27bLeXXu9j98BXCgu4oRL38FpTPQFJcWOFAF2OGY8cdMk9YtC2ucXv9ujj33WL-u4c5vtbkOSxU69KnbzvCJjAju4qH_ehCozaF5aiHte226_1CVF-zAzRhNyz4Yyf5vCACoMx9ngU3_u-8G0sjZ_BEiLc6ezD7ulwYjaCw7XYENlddhpr_n_67BnezOgUlXrsL0GNFiHWvk8R5clzvTVAfi37zNkakXkCI0N3LE2PpHJjFcLqUAmYI0m07lxnSD5MdBEs-HoEHqd-9e7rlO2UXBiz7gL9Y0I-9JogyuCKBFMUR77EgvFqY-TwNSjKiVdRVM3MoBcRLiJiKTPaKyvNx45gko2ztQxIMJdFkcBUTKNqJuwKJWBpmeE80jbEbQBzeV6hpMFXEZIAqZtBEIacG0XePluBZpsOBNqzoSGM6FowLllQagF3kQxZKbG89zkpOn_8KjADbixvAlLzcv_nrH5L-oT2PJsth8-hcpsOldn2vyYRS2oth_enu5bhdh9Af4wz1s |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZgO_CQeAwQ4xkkDjxU1DRpkx4HYgw2OA0JTlXSpoCAbmzdhV9P0jUMEBy4tk7axLFjx_YXgH3FeJwwETg4jYl2UFLsCB5ih2GfJW6apEFRSHt9E7Ru6dWdf1fWcQ9ttrsNSRaaelLs5nlFxgR2cFH_PA1Vqv0TrwLVxsV9-9wqYOqS4gIx00qTMs8GM3_rxEAqPPayhzf9we9b08Te_BEiLXae5iJ07T-PE06eT0a5PInff8A5_nNQS7BQWqKoMV46yzClshrMN74EFmqwaC99QKUOqMHcFwTDGiyXz4fooASwPlyB4PQpR6YIRbyinsFR1lYtMin3arzckImEo_5gZM5kkHh50ET54-sq3DbPu2ctp7yfwYk9cw6pXS0cCCNmLg9lwn1FWRwIzBWjAU5CU-iqlHAVTV1pkL4IdxMuReDTWPtNHlmDStbL1Dogwlw_liFRIpXUTXyZilDT-4QxqQ0UWoeNTzZF_TEOR0RCXxsfhNThyPLt890EjdlMcKQnODITHPE67FnORlqSTHhEZKo3GppkNz0Oj3Jch2PLragU6eHfPW78i3oXZlrd607Uubxpb8KsZ1MK8RZU8sFIbWsbJ5c75Zr-APzq7Wg |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT8MwDLZ4SAiQgA0Q4xkkDjxU0TRpkx7HYxqviQOTuFVpmwISdIN1_5-4a9hAcODauqka242Tz_4McKCFTFKhAodmCTMblIw6SobUEdQXqZulWVAW0t51gnaXXz_6j1Wf04HNdreQ5KimAVma8uK0n2an48I3zyuzJ6hDy1roaZjlyJNgDLrrNe2vmLusbCWGzxhB4VlY87chkFzhuZc_vZtXf1-kxpHnD7C0XINaK7BUBY-kOdJ2DaZ0XofF5gQWUIdl26eBVG5bh4UJ0sE61KrrA3JYcU4frUJw9lIQrBtRb6SH1McmECWYJa9HFkIQvCb9jyEeoxD1-mSEiue3Nei2Lh_O207VUsFJPDw6NLsjGij0DFeGcSp9zUUSKCq14AFNQ6xN1Vq5mmdujORcTLqpjFXg88RsdTy2DjN5L9cbQJhw_SQOmVZZzN3UjzMVGnmfCRGbmII3YPNrPqP-iDojYqFv4gXGGnBsJ_jr3phAGTUTGc1EqJlINmDfqiAyxo-Ihsp1bzjA_DTzHR6XtAEnVjdR5YWDv0fc_Jf0HszdX7Si26vOzRbMezYJkG7DTPEx1DsmKini3dLyPgHBx9Tv |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Bit+Stream+Oriented+Enumeration+Tree+Pruning+Algorithm&rft.jtitle=%E4%B8%8A%E6%B5%B7%E4%BA%A4%E9%80%9A%E5%A4%A7%E5%AD%A6%E5%AD%A6%E6%8A%A5%EF%BC%9A%E8%8B%B1%E6%96%87%E7%89%88&rft.au=%E9%82%B1%E5%8D%AB%E4%B8%9C+%E9%87%91%E5%87%8C+%E6%9D%A8%E5%B0%8F%E7%89%9B+%E6%9D%A8%E7%BA%A2%E5%A8%83&rft.date=2011-10-01&rft.issn=1007-1172&rft.eissn=1995-8188&rft.volume=16&rft.issue=5&rft.spage=567&rft.epage=570&rft_id=info:doi/10.1007%2Fs12204-011-1190-8&rft.externalDocID=39552133 |
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F85391X%2F85391X.jpg |