基于互联网基础设施操控的高级持续网络攻击检测与防范
序号 | 标题 | 类型 | 作者 |
---|---|---|---|
1 | Measuring Privacy Threats in China-Wide Mobile Networks | 会议论文 | Zhang Mingming;Liu Baojun;Lu Chaoyi;Zhang Jia;Hao Shuang;Duan Haixin |
2 | We Still Don’t Have Secure Cross-Domain Requests: an Empirical Study of CORS | 会议论文 | Chen Jianjun;Jiang Jian;Duan Haixin;Wan Tao;Chen Shuo;Paxson Vern;Yang Min |
3 | Abusing CDNs for Fun and Profit: Security Issues in CDNs' Origin Validation | 会议论文 | Guo Run;Chen Jianjun;Liu Baojun;Zhang Jia;Zhang Chao;Duan Haixin;Wan Tao;Jiang Jian;Hao Shuang;Jia Yaoqi |
4 | The Ever-Changing Labyrinth: A Large-Scale Analysis of Wildcard DNS Powered Blackhat SEO | 会议论文 | Du Kun;Yang Hao;Li Zhou;Duan Haixin;Zhang Kehuan |
5 | Host of Troubles: Multiple Host Ambiguities in HTTP Implementations | 会议论文 | Chen Jianjun;Jiang Jian;Duan Haixin;Weaver Nicolas;Wan Tao;Paxson Vern |
6 | Analysis and Measurement of Zone Dependency in the Domain Name System | 会议论文 | Jiang Jian;Zhang Jia;Duan Haixin;Li Kang;Liu Wu |
7 | Who Is Answering My Queries: Understanding and Characterizing Interception of the DNS Resolution Path | 会议论文 | Liu Baojun;Lu Chaoyi;Duan Haixin;Liu Ying;Li Zhou;Hao Shuang;Yang Min |
8 | Finding the best answer: measuring the optimization of public and authoritative DNS | 期刊论文 | Zhang Jia;Duan Haixin;Jiang Jian;Liang Jinjin;Wu Jianping |
9 | A Reexamination of Internationalized Domain Names: the Good, the Bad and the Ugly | 会议论文 | Liu Baojun;Lu Chaoyi;Li Zhou;Liu Ying;Duan Haixin;Hao Shuang;Zhang Zaifeng |
10 | Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search | 会议论文 | Liao Xiaojing;Yuan Kan;Wang Xiaofeng;Pei Zhongyu;Yang Hao;Chen Jianjun;Duan Haixin;Du Kun;Alowaisheq Eihal;Alrwais Sumayah;Xing Luyi;Beyah Raheem |
11 | Forwarding-Loop Attacks in Content Delivery Networks | 会议论文 | Chen Jianjun;Jiang Jian;Zheng Xiaofeng;Duan Haixin;Liang Jinjin;Li Kang;Wan Tao;Paxson Vern |
12 | An accurate distributed scheme for detection of prefix interception | 期刊论文 | Li Song;Li Xing;Duan Haixin;Wang Zhiliang;Liang Jinjin;Duan HX |
13 | Cookies Lack Integrity: Real-World Implications | 会议论文 | Zheng Xiaofeng;Jiang Jian;Liang Jinjin;Duan Haixin;Chen Shuo;Weaver Nicolas |
14 | How to Learn Klingon Without a Dictionary: Detection and Measurement of Black Keywords Used by the Underground Economy | 会议论文 | Yang Hao;Ma Xiulin;Du Kun;Duan Haixin;Wu Jianping;Su Xiaodong;Liu Guang;Geng Zhifeng;Wu Jianping |
15 | MAF-SAM: An effective method to perceive data plane threats of inter domain routing system | 期刊论文 | Guo Yi;Duan Haixin;Chen Jikun;Miao Fu |
16 | 基于特征融合相似度的域间路由系统安全威胁感知方法 | 期刊论文 | 郭毅;段海新;张连成;邱菡 |
17 | Route Leaks Identification by Detecting Routing Loops | 会议论文 | Li Song;Duan Haixin;Wang Zhiliang;Li Xing |