Researches on the Analysis Framework of Application Layer Communication Protocol Based on SQLite

Author(s):  
Wenyuan Xu ◽  
Hao Li ◽  
Weifeng Xu
2013 ◽  
Vol 694-697 ◽  
pp. 2576-2580 ◽  
Author(s):  
Si Zu Hou ◽  
Feng Ying Kong ◽  
Wei Liu

IEC 61850 is an international standard developed by the International Electrotechnical Commission TC57 substation automation communication networks and systems. It uses MMS (Manufacturing Message Specification) as a real-time communication protocol of the application layer, and achieves the communication between the substation layer and the spacer layer. This paper describes the features and functions of the IEC 61850 and MMS technology and focuses on the principle of MMS mapping in the application of IEC 61850 , then preliminarily leads to the overall design framework of the IEC 61850 gateway.


2013 ◽  
Vol 791-793 ◽  
pp. 2023-2026 ◽  
Author(s):  
Wei Feng Xu ◽  
Shu Fen Liu ◽  
Lu Han

For complex application layer protocol of low altitude communication system which may be implemented with several wireless communication technologies which include BeiDou Navigation Satellite System, 3G, Digital radio, GPS, ADS-B, etc., we design a low altitude communication protocol conversion process based on pattern match to enhance the capacity of low-altitude flight service stations processing multi-source information from low-altitude aircrafts or other stations. In the process, the application layer protocol of information is identified with the algorithm based on BM pattern matching and CAM multi-pattern matching fusion firstly, secondly, the common intermediate protocol information is produced, and target protocol information is generated finally.


Author(s):  
Amit Sharma

Distributed Denial of Service attacks are significant dangers these days over web applications and web administrations. These assaults pushing ahead towards application layer to procure furthermore, squander most extreme CPU cycles. By asking for assets from web benefits in gigantic sum utilizing quick fire of solicitations, assailant robotized programs use all the capacity of handling of single server application or circulated environment application. The periods of the plan execution is client conduct checking and identification. In to beginning with stage by social affair the data of client conduct and computing individual user’s trust score will happen and Entropy of a similar client will be ascertained. HTTP Unbearable Load King (HULK) attacks are also evaluated. In light of first stage, in recognition stage, variety in entropy will be watched and malevolent clients will be recognized. Rate limiter is additionally acquainted with stop or downsize serving the noxious clients. This paper introduces the FAÇADE layer for discovery also, hindering the unapproved client from assaulting the framework.


Sign in / Sign up

Export Citation Format

Share Document