- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Network Packet Processing and Optimization
- Educational Technology and Assessment
- Anomaly Detection Techniques and Applications
- Network Traffic and Congestion Control
- Caching and Content Delivery
- Privacy, Security, and Data Protection
National University of Defense Technology
2019-2023
Xinjiang Normal University
2005
The botnet relies on the Command and Control (C&C) channels to conduct its malicious activities remotely. Domain Generation Algorithm (DGA) is often used by botnets hide their server evade take-down attempts, which allows bot generate a large number of domain names until it finds C&C server. lengths generated DGAs are different. Our research that length name has an impact performance DGA detection model. In other words, model sensitive name. this case, attackers can simply designing specific...
Abstract With Internet access shifting from desktop-driven to mobile-driven, application-level mobile traffic identification has become a research hotspot. Although considerable progress been made in this field, two obstacles are hindering its further development. Firstly, there is lack of sharable labeled datasets. it easy capture traffic, labeling at the application level non-trivial. Besides, researchers usually hold conservative attitude toward publishing their datasets for privacy...
In recent years, multimedia traffic has been growing rapidly in the network, and it is of great significance to effectively supervise manage traffic. This paper not only analyzes some specific transmission protocols, but also studies their communication characteristics. We proposes a identification framework as well, which advantage scalability. addition, algorithms for RTSP, RTP/RTCP traffic, have high accuracy, are described validated this paper. More importantly, solution put forward,...
The detection of botnets has always been a hot spot in the field network security. However, there are still many challenges botnet detection. Most current approaches, such as machine learning and blacklists, cannot discover evolving variants. These methods usually only valid for specific protocols which not general. Even they may be difficult to deal with encrypted traffic. In this paper, we design protocol-independent method these challenges. Our takes advantage group characteristic botnet,...