Jianbing Liang

ORCID: 0000-0003-1477-4616
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Network Packet Processing and Optimization
  • Educational Technology and Assessment
  • Anomaly Detection Techniques and Applications
  • Network Traffic and Congestion Control
  • Caching and Content Delivery
  • Privacy, Security, and Data Protection

National University of Defense Technology
2019-2023

Xinjiang Normal University
2005

The botnet relies on the Command and Control (C&C) channels to conduct its malicious activities remotely. Domain Generation Algorithm (DGA) is often used by botnets hide their server evade take-down attempts, which allows bot generate a large number of domain names until it finds C&C server. lengths generated DGAs are different. Our research that length name has an impact performance DGA detection model. In other words, model sensitive name. this case, attackers can simply designing specific...

10.1016/j.cose.2022.102803 article EN cc-by-nc-nd Computers & Security 2022-06-10

Abstract With Internet access shifting from desktop-driven to mobile-driven, application-level mobile traffic identification has become a research hotspot. Although considerable progress been made in this field, two obstacles are hindering its further development. Firstly, there is lack of sharable labeled datasets. it easy capture traffic, labeling at the application level non-trivial. Besides, researchers usually hold conservative attitude toward publishing their datasets for privacy...

10.1093/comjnl/bxad076 article EN The Computer Journal 2023-08-02

In recent years, multimedia traffic has been growing rapidly in the network, and it is of great significance to effectively supervise manage traffic. This paper not only analyzes some specific transmission protocols, but also studies their communication characteristics. We proposes a identification framework as well, which advantage scalability. addition, algorithms for RTSP, RTP/RTCP traffic, have high accuracy, are described validated this paper. More importantly, solution put forward,...

10.1088/1742-6596/1168/5/052033 article EN Journal of Physics Conference Series 2019-02-01

The detection of botnets has always been a hot spot in the field network security. However, there are still many challenges botnet detection. Most current approaches, such as machine learning and blacklists, cannot discover evolving variants. These methods usually only valid for specific protocols which not general. Even they may be difficult to deal with encrypted traffic. In this paper, we design protocol-independent method these challenges. Our takes advantage group characteristic botnet,...

10.1155/2022/3161143 article EN cc-by Security and Communication Networks 2022-07-30
Coming Soon ...