Search Results - "Cheng, Qiumei"
-
1
Flow Table Saturation Attack against Dynamic Timeout Mechanisms in SDN
Published in Applied sciences (01-06-2023)“…Software-defined networking (SDN) enables dynamic management and flexible network control by employing reactive rule installation. Due to high power…”
Get full text
Journal Article -
2
SDN-LIRU: A Lossless and Seamless Method for SDN Inter-Domain Route Updates
Published in IEEE/ACM transactions on networking (01-08-2017)“…Maintaining service availability during an inter-domain route update is a challenge in both conventional networks and software-defined networks (SDNs). In the…”
Get full text
Journal Article -
3
Intrinsic Security and Self-Adaptive Cooperative Protection Enabling Cloud Native Network Slicing
Published in IEEE eTransactions on network and service management (01-06-2021)“…With the emergence of cloud native technology, the network slicing enables automatic service orchestration, flexible network scheduling and scalable network…”
Get full text
Journal Article -
4
Adaptive IP Mutation: A Proactive Approach for Defending against Worm Propagation
Published in 2016 IEEE 35th Symposium on Reliable Distributed Systems Workshops (SRDSW) (01-09-2016)“…IP address mutation is a proactive defense method that is used to reduce the risk of network attacks, especially to deal with the worm propagation attacks…”
Get full text
Conference Proceeding -
5
Discovering Attack Scenarios via Intrusion Alert Correlation Using Graph Convolutional Networks
Published in IEEE communications letters (01-05-2021)“…The alert correlation process that aggregates computer network security alerts to the same attack scenario provides a coherent view of network status at a…”
Get full text
Journal Article -
6
SDN-RDCD: A Real-Time and Reliable Method for Detecting Compromised SDN Devices
Published in IEEE/ACM transactions on networking (01-10-2018)“…A software-defined network (SDN) is increasingly deployed in many practical settings, bringing new security risks, e.g., SDN controller and switch hijacking…”
Get full text
Journal Article -
7
Combination Attacks and Defenses on SDN Topology Discovery
Published in IEEE/ACM transactions on networking (01-04-2023)“…The topology discovery service in Software-Defined Networking (SDN) provides the controller with a global view of the substrate network topology, allowing for…”
Get full text
Journal Article -
8
Machine learning based malicious payload identification in software-defined networking
Published in Journal of network and computer applications (15-10-2021)“…Deep packet inspection (DPI) has been extensively investigated in software-defined networking (SDN) as complicated attacks may intractably inject malicious…”
Get full text
Journal Article -
9
rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN
Published in IEEE transactions on information forensics and security (2024)“…The flow table is a critical component of Software-Defined Networking (SDN). However, flow tables' limited capacity makes them highly vulnerable to flow table…”
Get full text
Journal Article -
10
Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks
Published in Science China. Information sciences (01-08-2022)Get full text
Journal Article -
11
In-band Network Telemetry Manipulation Attacks and Countermeasures in Programmable Networks
Published in 2023 IEEE/ACM 31st International Symposium on Quality of Service (IWQoS) (19-06-2023)“…In-band Network Telemetry (INT) is a widely used monitoring framework in modern large-scale networks that provides fine-grained visibility into network…”
Get full text
Conference Proceeding -
12
Meta-analysis of the association of HLA-DRB1 with rheumatoid arthritis in Chinese populations
Published in BMC musculoskeletal disorders (27-10-2013)“…Individual studies have reported different results regarding the association of HLA alleles with RA in Chinese populations. This study was performed to…”
Get full text
Journal Article -
13
Clinicopathological characteristics of vascular endothelial growth factor expression in uveal melanoma: A meta-analysis
Published in Molecular and clinical oncology (01-05-2014)“…Angiogenesis is a potential prognostic factor that has been extensively investigated in patients with uveal melanoma (UM). Vascular endothelial growth factor…”
Get full text
Journal Article -
14
AFTM: An Adaptive Flow Table Management Scheme for OpenFlow Switches
Published in 2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (01-12-2020)“…Software-Defined Networking (SDN) is an emerging network platform, which decouples the control and data planes. As the most popular southbound protocol and…”
Get full text
Conference Proceeding -
15
STEP: Spatial-Temporal Network Security Event Prediction
Published 31-05-2021“…Network security events prediction helps network operators to take response strategies from a proactive perspective, and reduce the cost caused by network…”
Get full text
Journal Article -
16
Packet-Level Adversarial Network Traffic Crafting using Sequence Generative Adversarial Networks
Published 08-03-2021“…The surge in the internet of things (IoT) devices seriously threatens the current IoT security landscape, which requires a robust network intrusion detection…”
Get full text
Journal Article -
17
Think That Attackers Think: Using First-Order Theory of Mind in Intrusion Response System
Published in 2019 IEEE Global Communications Conference (GLOBECOM) (01-12-2019)“…The intrusion response system is dedicated to automatically respond to sophisticated network intrusions, which is a sequential decision-making problem for…”
Get full text
Conference Proceeding -
18
Guarding the Perimeter of Cloud-Based Enterprise Networks: An Intelligent SDN Firewall
Published in 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (01-06-2018)“…Guarding the perimeter of cloud-based enterprise networks is a challenge due to massive traffic with dynamic nature. Current firewalls of enterprise networks…”
Get full text
Conference Proceeding -
19
Machine Learning based Malicious Payload Identification in Software-Defined Networking
Published 04-01-2021“…Deep packet inspection (DPI) has been extensively investigated in software-defined networking (SDN) as complicated attacks may intractably inject malicious…”
Get full text
Journal Article