Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hao Zhiyu is active.

Publication


Featured researches published by Hao Zhiyu.


Security and Communication Networks | 2015

Botnet spoofing: fighting botnet with itself

Cui Xiang; Yin Lihua; Jin Shuyuan; Hao Zhiyu; Li Shuhao

A botnet consists of a network of compromised computers connected to the Internet that is controlled by a remote attacker (botmaster) via command and control (C&C) channels. Botnets are the root cause of many Internet attacks such as Email spam, extortion through DDoS, seeding malware, and online identity theft etc. Recently, the arms race between botmasters and defenders has become increasingly common. Defenders have successfully shut down many well-known botnets such as Rustock, Mariposa, Waledac, Stuxnet, Coreflood, and Kelihos by exploiting their C&C design flaws. However, these countermeasures also stimulate the botnets to be more resilient. For security-conscious Internet users, the hostbased security software (i.e., anti-virus and firewall) could provide effective protection against the botnet attacks; however, the remaining security-unconscious users will suffer from the botnet attacks and be compromised easily. Consequently, how to protect both security-conscious and security-unconscious users against advanced botnets (without any C&C vulnerability) has posed a great challenge to this day. In this paper, we propose the idea of botnet spoofing which aims at addressing the above challenge to some degree. We define botnet spoofing as a technique which could trick a malicious bot to spread BotSpoofer instead of spreading itself. BotSpoofer is defined as a computer program which implements botnet spoofing technique.


Archive | 2014

Automatic online virtual machine software installing method and system

Yun Xiaochun; Hao Zhiyu; Fei Haiqiang; Zhang Yongzheng; Li Lun; Ding Zhenquan; Zou Qingxin


Archive | 2013

Massive email analyzing method and system based on relational graph

Li Shuhao; Yun Xiaochun; Zhang Yongzheng; Hao Zhiyu; Huo Yongliang


Archive | 2013

Traffic playback method and system for virtual network

Yun Xiaochun; Hao Zhiyu; Li Lun; Zhang Yongzheng; Fei Haiqiang; Ding Zhenquan


Archive | 2014

Method and system for off-line and automatically installing software of virtual machine

Yun Xiaochun; Hao Zhiyu; Fei Haiqiang; Zhang Yongzheng; Li Lun; Ding Zhenquan; Han Yandong


Archive | 2015

Windows remote mapping method for Linux block device

Yun Xiaochun; Hao Zhiyu; Sun Zhenxi; Zhang Yongzheng; Li Lun; Fei Haiqiang; Ding Zhenquan


Archive | 2017

Memory page recovery method and system based on page classification

Hao Zhiyu; Xu Jing; Cui Lei; Peng Yaqiong


Archive | 2017

IP positioning database credibility evaluation method based on dynamic trust model

Xi Rongrong; Hao Zhiyu; Cui Lei; Liu Yongji


Archive | 2017

Traffic replay method and system for network simulation environment

Li Lun; Hao Zhiyu; Deng Xin; Li Dahui


Archive | 2017

Wait-free stack operation method based on array structure under multinuclear environment

Peng Yaqiong; Hao Zhiyu; Liu Yongji; Li Dahui; Cui Lei

Collaboration


Dive into the Hao Zhiyu's collaboration.

Top Co-Authors

Avatar

Li Shuhao

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Cui Xiang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Jin Shuyuan

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Xiao Jun

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yin Lihua

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge