Space link protocol blind identification method and system

A link protocol and blind recognition technology, applied in the transmission system, digital transmission system, electrical components, etc., can solve the problems of increasing space and time overhead, low mining efficiency, mining processor overflow, etc.

Active Publication Date: 2013-11-27
NAT SPACE SCI CENT CAS
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, for the case where the data sequence is huge and the frequent patterns are long, the mining efficiency is quite low
[0007] 2) A large number of candidate patterns may be generated during the scanning process
If there are too many short-length frequent patterns, a large number of candidate patterns will be generated when the length of sensitive information is expanded through connection operations, which will increase the overhead of space and time, and even cause the mining processor to overflow

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Space link protocol blind identification method and system
  • Space link protocol blind identification method and system
  • Space link protocol blind identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0073] Among the identification objects targeted by this method, binary bit stream data (or other data that can be converted into binary) is converted into hexadecimal, called target data. The hexadecimal data element contains sixteen numbers from 0 to F, so the pattern sequence P with a length of k is combined with a hexadecimal number to form sixteen subsequences Q with a length of "k+1". They are OP, 1P, 2P, 3P, 4P, 5P, 6P, 7P, 8P, 9P, AP, BP, CP, DP, EP, FP, and the relationship between the subsequence Q and the pattern sequence P of length k is as follows: Figure 1-b As shown, enumerating all sequences with a length of 1 to k in the target data can form a complete hexadecimal tree linked by parent-child relationship. Figure 1-a is a complete hexadecimal state diagram, Figure 1-b is one of the states.

[0074] If you want to mine the counting of frequent sequences within the length of k bits in the target data, you need to create k buffs, and then read the characters i...

Embodiment

[0113] Assume that the target data is a set of binary data with a data size of 12Kbyte, frame synchronization codeword: 1ACFFCID (unknown), frame length: 256 byte (unknown).

[0114] Concrete implementation steps after adopting the scheme of the present invention are:

[0115] 1) Read the binary bit stream data file ccsds_data.raw stored in the hard disk of the computer in advance.

[0116] 2) Perform data preprocessing, convert binary data into hexadecimal data, and generate target data ccsds_data.hex.

[0117] 3) Set the length of the pattern sequence to 4 bits (empirical value), call the method of the complete hexadecimal tree of the finite state machine, perform initial frequent sequence statistics on the target data ccsds_data.hex, and generate the initial frequent sequence set:

[0118]{1ACF,ACFF,C1D4,0066,C025,AB95,3FE2,72C3,6012,B01A,2228,2222,B952,10C8,01AA,AAAA,A10C,021C,FC1D,FFC1,03FE,1020,2030,3040,4050 ,5060,6070,7080,8090,90A0,A0B0,B0C0,C0D0,D0E0,E0F0},

[011...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a space link protocol blind identification method and system. The space link protocol blind identification method comprises the steps that target data in a file to be blind identified are converted into hexadecimal data; all frequent sequences within an appointed length range are found based on the hexadecimal data to constitute an initial frequent sequence set, and statistics is performed on the number of occurring times of the sequences of each appointed length; count values of the frequent sequences obtained by the statistics are compared with a plurality of set min_threshold values one by one, and the frequent sequences of which the count values are larger than the min_threshold values are stored in a middle frequent sequence set; a pattern matching method is adopted, all sequences in the middle frequent sequence set are searched for and positioned in the target data one by one, all equally-spaced frequent sequences are extracted from the middle frequent sequence set, and a target frequent sequence set is constituted; pattern matching is conducted on the target frequent sequence set obtained by excavation and space link protocol frame synchronization word sensitive information, and applied protocol types are judged.

Description

technical field [0001] The present invention relates to the field of space data communication, in particular to the field of space link protocol data format identification and standardized detection, especially for the lack of prior knowledge of the target protocol, the present invention provides a space link from bit stream data A method for blind identification of road protocols. Background technique [0002] In current space data communication, space link protocols are widely used to organize and manage various types of space data information. The space link protocol is the skeleton and nerve of the space link information system, and the link to maintain the normal transmission of information. Protocol identification is to use certain algorithms and tools to determine the type of protocol adopted by the target information through feature analysis, clarify the data format of the target information, and lay the foundation for further information application. [0003] At p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26
Inventor 姚秀娟孟新陈玲李雪闫毅高翔
Owner NAT SPACE SCI CENT CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products