An architecture for intrusion detection using honey pot

ZH Tian, BX Fang, XC Yun - Proceedings of the 2003 …, 2003 - ieeexplore.ieee.org
The most common shortcomings in the existing intrusion detection systems (IDSs) are information
overload, unknown attacks, false positives and false negatives. We present the design …

Comparison of stringmatching algorithms: an aid to information content security

AN Du, BX Fang, XC Yun, MZ Hu… - Proceedings of the …, 2003 - ieeexplore.ieee.org
We analyzed the core ideas of three basic string matching algorithms (KMP, BM, DFA),
described the principles of five advanced online multi-pattern matching algorithms (AC, RAC, …

A risk assessment approach for network information system

YZ Zhang, BX Fang, XC Yun - Proceedings of 2004 …, 2004 - ieeexplore.ieee.org
Currently, risk assessment has been an effective technology of protecting network
information system. In order to achieve more accurate result, a new assessment approach is …

A new approach for early detection of internet worms based on connection degree

C Bo, BX Fang, XC Yun - 2005 International Conference on …, 2005 - ieeexplore.ieee.org
In recent years, Internet-scale worm incidents occurred many times. People wonder at the
speediness of the worm spread and the severe damage to the Internet. So people began to …

Quantitative threat situation assessment based on alert verification

R Xi, X Yun, Z Hao, Y Zhang - Security and Communication …, 2016 - Wiley Online Library
Traditional network threat situational assessment is based on raw alerts, not combined with
contextual information, which influences the accuracy of assessment. In this paper, we …

Research on network node correlation in network risk assessment

YZ Zhang, BX Fang, Y Chi, XC Yun - CHINESE JOURNAL OF …, 2007 - cjc.ict.ac.cn
Background Abstract In the field of network risk assessment, to enhance the accuracy of
assessment, the connectivity between network nodes has been introduced to many studies. …

Defend against application-layer distributed denial-of-service attacks based on session suspicion probability model

J Xiao, XC Yun, YZ Zhang - Jisuanji Xuebao(Chinese Journal of …, 2010 - cjc.ict.ac.cn
Background Abstract Mitigating Distributed Denial-of-Service (DDoS) attacks becomes
more challenging with increasing available resources and techniques for attackers. Current …

A model of network device coordinative run

TN Zang, XC Yun, YZ Zhang, CG Men… - Jisuanji Xuebao(Chinese …, 2011 - cjc.ict.ac.cn
Background Abstract Internet is an open network environment, large-scale distributed
malicious behaviors is increasing day by day on the internet. Potential relationships may exist …

A mining method for computer vulnerability correlation

YZ Zhang, XC Yun, BX Fang… - International Journal of …, 2005 - kuma.u-tokai.ac.jp
A MINING METHOD FOR COMPUTER VULNERABILITY CORRELATION Yong-Zheng
Zhang Xiao-Chun Yun, Bin-Xing Fang Tao Zhang Received July 200 … Xiao-Chun Yun, Bin-Xing …

Research and implementation of a high-performance distributed intrusion detection system

W YANG, B FANG, X YUN, H ZHANG… - Journal of Beijing …, 2004 - journal.bupt.edu.cn
Abstract: The performance bottleneck of the traditional networkintrusion detection system (NIDS)
is investigated in order to design and implement a high-performance distributed …