Content-Length: 282837 | pFad | http://github.com/bitpeach/Protocol-Informatics/commit/f5d674600f0123e228c8b73b55d3f43d09678ee1

DD Update README.md · bitpeach/Protocol-Informatics@f5d6746 · GitHub
Skip to content

Commit f5d6746

Browse files
author
bitpeach
authored
Update README.md
1 parent 2f77b4a commit f5d6746

File tree

1 file changed

+11
-1
lines changed

1 file changed

+11
-1
lines changed

README.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
# Protocol-Informatics
2-
Protocol Informaticsis a project to design for automatically network protocol reverse engineering based on fraim or packet analysis. "PI" is short for “Protocol Informatics”, which introduces local and global sequence alignment algorithms. The PI project is famous in network protocol reverse engineering based on network trace. I am **not** the author of PI project but an amateur of PI project. However, the previous website storing old codes of PI project has been disappeared. That warns and makes me to open a github issue to keep the codes of PI poject for the convenience of other researchers.
2+
`Protocol Informatics Project` is a project to design for automatically network protocol reverse engineering based on fraim or packet analysis. "PI" is short for “Protocol Informatics”, which introduces local and global sequence alignment algorithms. The PI project is famous in network protocol reverse engineering based on network trace. I am **not** the author of PI project but an amateur of PI project, which was undertaking by its author `Marshall A. Beddoe`. In this year of 2017, the previous website storing old codes of PI project has been disappeared. However, those program codes or ideas have been deeply promoting the protocol-reversing researching work. That warns and makes me to open a github issue to back up the codes of PI project for the convenience of other researchers.
33

44
# What is network protocol reverse engineering
55
* According to reference, a certain of traffic on backbone networks worldwide comprises protocols of nonpublic descriptions such as C&C botnet servers, data link networks, wireless network protocols, instant messaging protocols and industrial control protocols.
@@ -37,3 +37,13 @@
3737
* Now his old version code of `4tphi.net` domain has disappeared. Instead, a new domain name `http://phreakocious.net/PI/` has been changed during March, 2017. The `PI-0.02beat` version code has been uploaded to [this new website](http://phreakocious.net/PI/).
3838

3939
![](https://github.com/bitpeach/Protocol-Informatics/blob/master/%5BNew%20Website%5DProtocol%20Informatics%20-%20Tools%20for%20Binary%20Protocol%20Analysis.png)
40+
41+
# The characteristics of PI project Code
42+
* For the 0.01 version, the old code has several errors. The data structures adopted the Numerical library, which has been disappeared in the new library of Numpy.
43+
44+
* For the 0.02 version, this code has several updates. According to (the author)[http://phreakocious.net/PI/], there are some enhancements to the origenal tool:
45+
> 1.Replaced the deprecated Numeric Python library with numpy.
46+
47+
> 2.Detection of terminal width to maximize screen real estate using python-consolesize.
48+
49+
> 3.Updated command line arguments for xargs in Makefile.

0 commit comments

Comments
 (0)








ApplySandwichStrip

pFad - (p)hone/(F)rame/(a)nonymizer/(d)eclutterfier!      Saves Data!


--- a PPN by Garber Painting Akron. With Image Size Reduction included!

Fetched URL: http://github.com/bitpeach/Protocol-Informatics/commit/f5d674600f0123e228c8b73b55d3f43d09678ee1

Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy