- Software-Defined Networks and 5G
- Network Security and Intrusion Detection
- Cloud Computing and Resource Management
- Wireless Networks and Protocols
- Mobile Agent-Based Network Management
- Caching and Content Delivery
- Opportunistic and Delay-Tolerant Networks
- Network Traffic and Congestion Control
- Software System Performance and Reliability
- IoT and Edge/Fog Computing
- Network Time Synchronization Technologies
- Energy Efficient Wireless Sensor Networks
- Wireless Sensor Networks and IoT
- Software Engineering and Design Patterns
- Service-Oriented Architecture and Web Services
- IPv6, Mobility, Handover, Networks, Security
- Advanced Malware Detection Techniques
- Distributed and Parallel Computing Systems
- Data Stream Mining Techniques
- Solar Radiation and Photovoltaics
- Power Systems and Technologies
- Cooperative Communication and Network Coding
- Mobile Ad Hoc Networks
Southeast University
2022-2024
Southeast University
2024
Carleton University
2022-2023
Xijing University
2022
Nanjing University
2007-2013
Air Force Engineering University
2012
In this paper, we uncover a new side-channel vulnerability in the widely used NAT port preservation strategy and an insufficient reverse path validation of Wi-Fi routers, which allows off-path attacker to infer if there is one victim client same network communicating with another host on Internet using TCP. After detecting presence TCP connections between server, can evict original mapping reconstruct at router by sending fake packets due routers' disabling window tracking strategy, has been...
Host Load Prediction is one of the most effective measures to improve resource utilization in Cloud systems. As drastic fluctuation host load Cloud, accurate prediction still a challenge. In this paper, we propose new method which combines Phase Space Reconstruction (PSR) and Group Method Data Handling (GMDH) based on Evolutionary Algorithm (EA). Our proposed could predict not only mean consecutive future time intervals, but also actual each interval. We evaluate our using trace Google data...
In order to alleviate the node mobility problem which cause frequent link ruptures between source and destination nodes data packets loss during transmission in Mobile Ad hoc Networks, we propose a new routing protocol called AD-AODV based on famous AODV protocol. By introducing novel metric M whose value depends hop number average of given route, improve mechanism enable select most stable route.A lot simulations are operated variation speed evaluate performance Simulation results compared...
The research community has been moving attention from Virtual Network Function (VNF) to Cloud-native (CNF) since cloudification brought the Virtualization (NFV) an advanced level. It already demonstrated that cloud-native technology brings high flexibility and efficiency large-scale network service deployment compared traditional VNF with Machines (VMs). However, more work is needed provide a flexible reliable Service Chaining (SFC) development solution in environment. This paper proposes...
The increasing popularity of cloud-based platforms has led to the emergence two prominent open-source solutions: OpenStack and Kubernetes. facilitates computing networking resources through virtual machine instances, while Kubernetes excels in container orchestration, managing containerized workloads services. This paper explores implementation Service Function Chaining (SFC) using a combination machines containers primary focus our study is analyze performance within context chain...
Secure data forwarding is critical for users to meet their requirements. In this paper, we propose D3 (Demon Detector in Data Plane), a source-driven, secure fault localization mechanism, which empowers the source localize faulty link Path Aware Networking, thus circumventing guarantee forwarding. utilizes instruct on-path routers, empowering it detect whether routers forward packet as expected. Compared with existing schemes that are difficult be deployed practice due heavy storage,...
In this paper, we conduct an empirical study on remote DoS attacks targeting NAT networks. We show that Internet attackers operating outside local networks can remotely identify a device and subsequently terminate TCP connections initiated from the identified to external servers. Our attack involves two steps. First, devices by exploiting inadequacies in PMTUD mechanism within specifications. This deficiency creates fundamental side channel allows distinguish if public IPv4 address serves or...
In pursuit of high-performance applications, the cloud is moving out data center and towards edge. Secure forwarding critical for users between edge remote cloud. this paper, we propose D3 (Demon Detector in Data Plane), a lightweight, secure fault localization mechanism, which can enable to localize faulty links thus avoid guarantee along path utilizes user instruct transit routers, empowering detect whether routers forward packet as expected. Compared with existing schemes that are...
During the synchronization process of Link-16 network, rapid movement the(a) terminal will cause calculation deviation synchronization. A new improved method precise synchronization, DR-RTT(Double-Reply Round Trip Timing) algorithm, is proposed. The responder establishes a equivalent condition through two reply messages to reduce motion time deviation. simulated, and results show that precise-synchronization can greatly network from terminals.
Although the TCP/IP protocols have made great contributions to development of Internet, there is a consensus that Internet needs improvement solve address space exhausted, content-oriented service, and so on. The academic community has proposed lots valuable but heterogeneous network protocols, which provide better services split Internet. To connect these networks, many middleboxes ( <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">...
Distributed Interactive Simulation Technology Development of Tank Unit against the system interconnection in network communications, there has been problems on data redundancy. we use latest IP Multicast technology to analyze and solve problem
Internet carries a variety of emerging applications which exhibit diverse requirements on transmission. The traditional end-to-end transmission scheme that provides only location-based content delivery has become the bottleneck deploying these applications. In recent years, newly proposed network addressing schemes enable modes. But each is advantageous in its specific scenario. Integrating all to optimize efficiency for still an open problem.To this end, we present intelligence serviced...
With the diversification of network requirements, it is difficult for traditional architectures to adapt current environment. To deal with this problem, we present nForest, a distributed and flexible networking architecture microservice. nForest assembly service match realizes communication among microservice by message bus. Repairer & Strangler Pattern achieves smoothly transition from existing architecture. At same time, was verified that achieved better flexibility sacrificing shorter...