Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Donghong Qin is active.

Publication


Featured researches published by Donghong Qin.


network operations and management symposium | 2012

PCA-subspace method — Is it good enough for network-wide anomaly detection

Bin Zhang; Jiahai Yang; Jianping Wu; Donghong Qin; Lei Gao

PCA-subspace method has been proposed for network-wide anomaly detection. Normal subspace contamination is still a great challenge for PCA although some methods are proposed to reduce the contamination. In this paper, we apply PCA-subspace method to six-month Origin-Destination (OD) flow data from the Abilene. The result shows that normal subspace contamination is mainly caused by anomalies from a few strongest OD flows, and seems unavoidable for subspace method. Further comparison of anomalies detected by subspace method and manually tagged anomalies from each OD flows, we find that anomalies detected by subspace method are mainly caused by anomalies from medium and a few large OD flows, and most anomalies of minor OD flows are buried in abnormal subspace and hard to be detected by PCA-subspace method. We analyze the reason for those anomalies undetected by subspace method and suggest to use normal subspace to detect anomalies caused by a few strongest OD flows, and to further divide abnormal subspace to detect more anomalies from minor OD flows. The goal of this paper is to address limitations neglected by prior works and further improve the subspace method on one hand, also call for novel detection methods for network-wide traffic on another hand.


international conference on communication technology | 2011

IP traffic classification based on machine learning

Donghong Qin; Jiahai Yang; Jiamian Wang; Bin Zhang

With the rapid development of Internet, many network applications (e.g., P2P) use dynamic ports and encryption technology, which makes the traditional port and payload-based classification methods ineffective. Hence, it is important and necessary to find the more effective ones. Currently the machine learning (ML) techniques provide a promising alternative one for IP traffic classification. In this work, we use the ML-based classification method to identify the classes of the unknown flows using the payload-independent statistical features such as packet-length and arrival-interval. In order to improve the efficiency of the classification methods, the feature reduction techniques are further adopted to refine the selected features for attaining a best group of features. Finally we compare and evaluate the ML classification algorithms based on the BRASIL data source in terms of the three metrics such as overall accuracy, average precision and average recall. Our experiments show that the decision-tree algorithm is the best ML one for IP traffic classification and is able to construct the real-time classification system.


advanced information networking and applications | 2012

AMIR: Another Multipath Interdomain Routing

Donghong Qin; Jaihai Yang; Zhuolin Liu; Hui Wang; Bin Zhang; Wei Zhang

Multipath routing is an important and promising technique to increase the Internets reliability and to give users greater control over the service they receive. Currently the interdomain routing protocol limits each router to using a single route for a destination network, which does not satisfy the diverse requirements of end users. In this paper, in order to support the effective and efficient multipath routing, we propose a multipath interdomain routing system(AMIR), which not only provides more novel paths but also realizes a new AS-level routing scheme. In the control plane, the topology information is collected from neighboring ASes around the primary path, and based on this topology, multipath of the special node pairs is calculated by our multipath discovery algorithm. In the data plane, we use the interdomain source routing to forward the packets. Experiments with Internet topology and routing data demonstrate that AMIR is practical and feasible, and offers tremendous flexibility and diversity for path selection with reasonable overhead.


network operations and management symposium | 2012

What's going on in Chinese IPv6 world

Lei Gao; Jiahai Yang; Hui Zhang; Donghong Qin; Bin Zhang

With IPv4 addresses quickly dwindling, the Internet is forcing an evolution of itself. During the long term transition from IPv4 to IPv6, whats going on in IPv6 world becomes unknown for network operators and researchers. In this paper, we propose a heuristic algorithm to identify p2p traffic accurately and implement traffic classification based on Netflow v9 exports to illustrate what applications Chinese IPv6 users are really running. Additionally, we present a detailed study of p2p traffic over IPv6 and advice ISPs to localize p2p traffic at the AS level for future IPv6 traffic management and network resources planning, leaving modeling traffic behavior and deeper classification of IPv6 traffic as our future work.


international conference on information networking | 2012

Multipath interdomain routing via deviation from primary path

Donghong Qin; Jaihai Yang; Hui Wang; Bin Zhang; Lei Gao; Zhuolin Liu

Multi-path routing is a promising technique to increase the Internets reliability and to give users greater control over the service they receive. Currently the interdomain routing protocol limits each router to using a single route for same destination, which may not satisfy the diverse requirements of end users. In this paper, in order to support the effective and efficient multi-path service(MPS), we propose a multi-path inter-domain routing via deviation from primary path(MIR-DPP) which includes two main steps as following. Firstly, to improve the path diversity of node pairs, the special topology collected from neighboring ASes around the primary path, and the multipath set is calculated by our multipath discovery method. Secondly, to gain high-quality paths which are not compliant with routing policy, a negotiation mechanism is designed to address policy limits. Experiments with Internet topology and routing data demonstrate that MIR-DPP offers tremendous flexibility and diversity for path selection with reasonable overhead.


asia-pacific network operations and management symposium | 2011

MCST: Anomaly detection using feature stability for packet-level traffic

Bin Zhang; Jiahai Yang; Jianping Wu; Donghong Qin; Lei Gao

In this paper, we present a statistical analysis of six traffic features based on entropy and distinct feature number at the packet level, and we find that, although these traffic features are unstable and show seasonal patterns like traffic volume for a long period, they are stable and consistent with Gaussian distribution in a short time period. However, this equilibrium property will be violated by some anomalies. Based on this observation, we propose a Multi-dimensional Clustering method for Short-time scale Traffic(MCST) to classify abnormal and normal traffic. We compare our new method to the well known wavelet technique. The detection result on synthetic anomaly traffic shows MCST can better detect the low-rate attacks than wavelet-based method, and detection result on real traffic demonstrates that MCST can detect more anomalies with low false alarm rate.


integrated network management | 2011

An efficient parallel TCAM scheme for the forwarding engine of the next-generation router

Bin Zhang; Jiahai Yang; Jianping Wu; Qi Li; Donghong Qin

Ternary Content-Addressable Memory (TCAM) is a popular hardware device for fast IP address lookup. High link transmission speed of Internet backbone demands more powerful IP address lookup engine. Restricted by the memory access speed, the lookup engine for next-generation routers demands exploiting parallelism among multiple TCAM chips. However, most existing schemes improve lookup performance and reduce power consumption but ignore the update efficiency. In this paper, we propose a crossed address range division and shared caching scheme. We improve the update efficiency significantly by buddy update method while keep low power dissipation by decreasing the number of the triggered TCAMs access in each lookup operation. The lookup throughput is ultra high through adaptive load balance. Our simulation results show that the proposed scheme can achieve an average lookup speedup factor greater than 11 with 12 TCAM chips, on the cost of 10% more memory space and an additional cache chip.


asia-pacific network operations and management symposium | 2011

FlowInfra: A fault-resilient scalable infrastructure for network-wide flow level measurement

Lei Gao; Jiahai Yang; Hui Zhang; Bin Zhang; Donghong Qin

The fine-grained flow level measurement is getting increasing demand in recent years. Though it fails to be a generic solution for its biased sampling, NetFlow is promising for its compatibility with major routers and its convenience to perform direct flow level measurement of both IPv4 and IPv6 traffic. Traditional flow level measurement systems based on NetFlow are mostly centralized and each of them independently performs traffic analysis of its local flow records without any coordination in a large-scale network, suffering from unbalancing workload and bad scalability. In this paper we present the design, implementation and evaluation of FlowInfra which is a fault-resilient scalable infrastructure for network-wide flow measurement of pure IPv6 flow records from NetFlow v9 exports. Through the assessment of its performance and flexible features, we show that FlowInfra achieved enhanced ability and robustness to perform network-wide flow level measurement and satisfied the goal for IPv6 network operation and management with better scalability.


international conference on intelligent computing | 2010

A novel dual-threshold denoising method by the wavelet transform

Donghong Qin; Jiahai Yang; Bin Zhang

Currently image denoising uses various threshold methods based on wavelet transform. In this paper, we propose an effective and novel dual-threshold denoising method that uses a piecewise and nonlinear function and selects two thresholds for every image subband, noise threshold Tn and signal threshold Ts. Then we further study the subband coefficients: those which are lower than Tn are noises and will be removed, those which are higher than Ts are signals and will be retained and those which are between Tn and Ts will be handled by their “intensity factors”. The method powerfully distinguishes the noise and the signal, overcomes the limitations of the traditional methods of the wavelet denoising using single threshold to deal with the coefficients. Experiments show that the method is better than other traditional ones in terms of SNR and visual effects.


international conference on networking and services | 2012

Merging Parallel Swarms for BitTorrent Performance Improving and Localization

Yang Wang; Jessie Hui Wang; Donghong Qin; Jiahai Yang

Collaboration


Dive into the Donghong Qin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge