Figure - available from: Mathematical Problems in Engineering
This content is subject to copyright. Terms and conditions apply.
Source publication
In order to solve the problem that there are a large number of unknown protocols on the network, which affect the network management and network security in varying degrees, an unknown binary protocol identification method is proposed. On the premise that the center cluster of unknown protocols is obtained by the clustering algorithm, the unknown p...
Similar publications
The existence of vulnerabilities is a serious threat to the security of networks, which needs to be detected timely. In this paper, machine learning methods were mainly studied. Firstly, network security vulnerabilities were briefly introduced, and then a Convolutional Neural Network (CNN) + Long Short-Term Memory (LSTM) method was designed to extr...