靶向性复杂攻击网络建模和行为分析研究

61572115
2015
F0205.网络与系统安全
张小松
面上项目
教授
电子科技大学
68万元
APT建模;行为分析;靶向性复杂攻击网络;金字塔攻击模型
2016-01-01到2019-12-31
  • 中英文摘要
  • 结题摘要
  • 结题报告
  • 项目成果
  • 项目参与人
查看更多信息请先登录或注册
查看更多信息请先登录或注册
查看更多信息请先登录或注册
重置
序号 标题 类型 作者
1 Block-Level Message-Locked Encryption with Polynomial Commitment for IoT Data 期刊论文 Ke Huang;Xiaosong Zhang;Xiaofen Wang
2 File-centric multi-key aggregate keyword searchable encryption for industrial internet of things 期刊论文 Rang Zhou;Xiaosong Zhang;Xiaojiang Du;Xiaofen Wang;Guowu Yang;Mohsen Guizani
3 Modeling Attack Process of Advanced Persistent Threat Using Network Evolution 期刊论文 Niu Weina;Zhang Xiaosong;Yang Guowu;Chen Ruidong;Wang Dong
4 Using XGBoost to Discover Infected Hosts Based on HTTP Traffic 期刊论文 Weina Niu;Ting Li;Xiaosong Zhang;Teng Hu;Tianyu Jiang;Heng Wu
5 Tor anonymous traffic identification based on gravitational clustering 期刊论文 Rao Zhihong;Niu Weina;Zhang XiaoSong;Li Hongwei
6 一种基于TCP数据包和自定义算法的网络通信安全方法 专利 张小松;牛伟纳;唐海洋;黄婉玉;卢嘉中;张林;李瑞杏;曹思宇;宋珺;许珑于
7 2017年中央网信办全国网络安全10大优秀人才 奖励 张小松
8 On the L(2,1)-labeling conjecture for brick product graphs 期刊论文 Shao Zehui;Zhang Xiaosong;Jiang Huiqin;Wang Bo;He Juanjuan
9 Building Redactable Consortium Blockchain for Industrial Internet-of-Things 期刊论文 Huang Ke;Zhang Xiaosong;Mu Yi;Wang Xiaofen;Yang Guomin;Du Xiaojiang;Rezaeibagha Fatemeh;Xia Qi;Guizani Mohsen
10 Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device 期刊论文 Wang Dong;Zhang Xiaosong;Ming Jiang;Chen Ting;Wang Chao;Niu Weina
11 One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications 期刊论文 Wang Xiaofen;Mu Yi;Chen Rongmao
12 基于虚拟函数表替换的软件安全防护方法 专利 张小松;牛伟纳;刘路遥;曹思宇;冯有钲;唐海洋;宋珺
13 Evolution-algorithm-based unmanned aerial vehicles path planning in complex environment 期刊论文 Xiaolei Liu;Xiaojiang Du;Xiaosong Zhang;Qingxin Zhu;Mohsen Guizani
14 基于云计算的高可用安全计算环境关键技术及应用 奖励 马勇;张小松;付萍萍;殷平;李凡
15 A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification 期刊论文 Niu Weina;Zhuo Zhongliu;Zhang Xiaosong;Du Xiaojiang;Yang Guowu;Guizani Mohsen
16 APT Traffic Detection Based on time transform 会议论文 Jiazhong Lu;Xiaosong Zhang;Wang Junfeng;Ying Lingyun
17 基于模拟栈和线程注入的一种ROP攻击栈溢出防护方法 专利 刘小垒;张小松;牛伟纳;周旷;户宇宙
18 具有异构感染率的僵尸网络建模与分析 期刊论文 牛伟纳;张小松;杨国武;卓中流;卢嘉中
19 Trees with Equal Total Domination and 2-Rainbow Domination Numbers 期刊论文 Shao Zehui;Sheikholeslami Seyed Mahmoud;Wang Bo;Wu Pu;Zhang Xiaosong
20 Botnet Detection Based on Fuzzy Association Rules 会议论文 Jiazhong Lu;Fengmao Lv;Quan-Hui Liu;Malu Zhang;Xiaosong Zhang
21 Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group 期刊论文 Xiaofen Wang;Yi Mu;Rongmao Chen;Xiaosong Zhang
22 一种基于RET指令与JMP指令的ROP攻击检测方法 专利 张小松;王颖;牛伟纳;陈瑞东;王东;俞工淳;漆艳梅;樊添
23 One-round secure fair meeting location determination based on homomorphic encryption 期刊论文 Wang;Xiaofen
24 Botnet recognition method based on fuzzy classification 会议论文 Dong Wang;Shuangmao Yang;Jiazhong Lu;Ruidong Chen;Xiaosong Zhang
25 Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data 会议论文 Rang Zhou;Xiaosong Zhang;Xiaofen;WangGuowu;YangWanpeng Li
26 一种基于浏览器标签属性的入侵检测方法及装置 专利 张小松;刘小垒;牛伟纳;陈瑞东;王东;黄金;罗荣森;向琦;唐海洋
27 Improving data field hierarchical clustering using Barnes–Hut algorithm 期刊论文 ZhongliuZhuo;XiaosongZhang;WeinaNiu;GuowuYang;JingzhongZhang
28 An Effective Conversation-Based Botnet Detection Method 期刊论文 Chen Ruidong;Niu Weina;Zhang Xiaosong;Zhuo Zhongliu;Lv Fengmao
29 物联网设备安全技术 专著 刘小珍;张小松;朱鲲鹏
30 Website fingerprinting attack on anonymity networks based on profile hidden markov model 期刊论文 Zhongliu Zhuo;Yang Zhang;Zhili Zhang;Xiaosong Zhang;Jingzhong Zhang
31 用于漏洞发掘的动态符号执行可视化方法 专利 张小松;陈厅;张泽亮;牛伟纳;陈瑞东;朱迦南;全威龙;王中晴;周旷
32 基于流相似性的两阶段P2P僵尸网络检测方法 期刊论文 牛伟纳;张小松;孙恩博;杨国武;赵凌园
33 DEVICE FOR AUTOMATICALLY GENERATING TEST CASES FOR EMBEDDED SOFTWARE AND METHOD THEREOF 专利 Ting Chen;Xiaosong Zhang;Dong Wang;Ruidong Chen;Weina Niu;Xiaofen Wang
34 Identifying APT Malware Domain Based on Mobile DNS Logging 期刊论文 Niu Weina;Zhang Xiaosong;Yang Guowu;Zhu Jianan;Ren Zhongwei
35 A multi-granularity heuristi-combining approach for censorship circumvention activity identification 期刊论文 Zhongliu Zhuo;Xiaosong Zhang;Ruixing Li;Ting Chen;Jingzhong Zhang
36 XXX的检测 奖励 何道敬;张小松;周涛;刘虹;郭建
37 基于树型结构的APT攻击预测方法 期刊论文 张小松;牛伟纳;杨国武;卓中流;吕凤毛
38 Adversarial Samples on Android Malware Detection Systems for IoT Systems 期刊论文 Liu Xiaolei;Du Xiaojiang;Zhang Xiaosong;Zhu Qingxin;Wang Hao;Guizani Mohsen
39 Generic Construction of Bent Functions and Bent Idempotents With Any Possible Algebraic Degrees 期刊论文 Chunming Tang;Zhengchun Zhou;Yanfeng Qi;Xiaosong Zhang;Cuiling Fan;Tor Helleseth
40 一种针对内网端口反弹型木马的防范方法 专利 张小松;白金;牛伟纳;徐浩然;吴安彬;唐海洋;张林
41 Phishing Emails Detection Using CS-SVM 会议论文 Weina Niu;Xiaosong Zhang;Guowu Yang;Zhiyuan Ma;Zhongliu Zhuo
42 Modeling Attack Process of Advanced Persistent Threat 会议论文 Niu Weina;Zhan Xiaosong;Li Kenli;Yang Guowu;Chen Ruidong
43 Adversarial attacks against profile HMM website fingerprinting detection model 期刊论文 Liu Xiaolei;Zhuo Zhongliu;Du Xiaojiang;Zhang Xiaosong;Zhu Qingxin;Guizani Mohsen
44 网络环境关键技术及应用 奖励 张小松;XXX;XXX;XXX;XXX;XXX;牛伟纳;陈瑞东;李洪伟;XXX;鲁力;XXX;XXX;XXX;XXX
45 TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems 期刊论文 Liu Xiaolei;Zhang Xiaosong;Guizani Nadra;Lu Jiazhong;Zhu Qingxin;Du Xiaojiang
查看更多信息请先登录或注册