Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jianfeng Zhang is active.

Publication


Featured researches published by Jianfeng Zhang.


Archive | 2013

Using Network Security Index System to Evaluate Network Security

Jianfeng Zhang; Fei Liu; Liming Zheng; Yan Jia; Peng Zou

Fast Internet growth and increase in number of network attack make network security essential in recent years. This paper proposes a novel approach to evaluate the network security situation using Network Security Index System (NSIS). The NSIS is composed of Foundational Index, Vulnerable Index, Risk Index and Comprehensive Index. Each index focuses on some specific aspect of network security, and the detailed methods of how to calculate the index are given. Experimental results show that the NSIS can assess the network security situation objectively and comprehensively.


international symposium on distributed computing | 2012

A Sampling Method for Mining User's Preference

Jianfeng Zhang; Weihong Han; Yan Jia; Peng Zou

Recent years, society relies heavily on the network infrastructure and information system. Protecting these assets from frequently network attacks needs to deploy some distributed security systems. However the amount of data produced by many distributed security tools can be overwhelming. So its very difficult and limited to get the most risky alert through manual process based on the huge network alerts with many attributes. The common method used to rank the alerts is scoring function, the higher the score, the more risky of the alert. Our motivation is that many times, user can not precisely specify the weights for the scoring function as their preference in order to get the preferable Ranking. In this paper, we propose a sampling method to mining users preference. Based on this preference, the most risky alerts can be easily ranked for emergency response. An extensive performance study using both synthetic and real datasets is reported to verify its effectiveness and efficiency.


international conference on computational and information sciences | 2012

Interactive Approach to Eliciting Users' Preference Using Comparisons

Jianfeng Zhang; Weihong Han; Yan Jia; Peng Zou

The complexity of todays networks and distributed systems makes the process of network monitoring difficult. The amount of data produced by many distributed security tools can be overwhelming. So its very difficult and limited to get the most risky alert through manual process based on the huge network alerts with many attributes, such as asset, priority, reliability, risk, type et al. The common method used to rank the alerts is scoring function, the higher the score, the more risky of the alert. Our motivation is that many times user can not precisely specify the weights for the scoring function as their preference in order to produce the preferred order of results. In this paper, we propose a new interactive preference searching method to elicit users preference. An extensive performance study using both synthetic and real datasets is reported to verify its effectiveness and efficiency.


international conference on information security | 2011

A Real Time Situation Awareness Model for Large-Scale Networks

Liming Zheng; Fei Liu; Jianfeng Zhang; Yan Jia; Peng Zou

NSAS (Network Situation Awareness System) can identify and predict potential attacks. It plays an important role in improving the emergency response capacity and proactive defense capability of the networks. Existing NSASs have many faults, such as lacking for multi-source data fusing, higher computational complexity, which are difficult to be applied to large-scale networks and real-time situational awareness. This paper introduces a real time NSAS model for large-scale network. The index system of this model is proposed first, and then the details of key technologies, including correlation analysis, index quantification and event predication, are given, finally, fuzzy analytic hierarchy process and configurable aggregation algorithm is adopted to evaluate the situation. The experimental results demonstrate the effectiveness and reasonability of the proposed model.


Archive | 2012

Methods for storing and querying offline historical statistical data of data stream

Dong Liu; Yan Jia; Weihong Han; Shuqiang Yang; Bin Zhou; Liming Zheng; Jinghu Xu; Jianfeng Zhang; Fei Liu; Rongze Xia; Yuanzheng Li; Wenxia Wang


Archive | 2012

Landmark system based on radio frequency identification

Hua Fan; Li He; Yan Jia; Binxing Fang; Lihua Yin; Weihong Han; Shuqiang Yang; Bin Zhou; Shuang Tan; Jianfeng Zhang; Juan Chen


Archive | 2012

Method for assessing stability of safety index system of multidimension network

Fei Liu; Yan Jia; Shuqiang Yang; Weihong Han; Bin Zhou; Liming Zheng; Jianfeng Zhang; Jinghu Xu; Dong Liu; Rongze Xia; Wenxia Wang; Yuanzheng Li


Archive | 2012

Large-scale network security situation evaluation method based on index system

Jianfeng Zhang; Weihong Han; Yan Jia; Shuqiang Yang; Bin Zhou; Liming Zheng; Jinghu Xu; Dong Liu; Fei Liu; Yuanzheng Li; Wenxia Wang; Rongze Xia


Archive | 2012

Multidimensional network safety index system correctness assessment method

Fei Liu; Yan Jia; Shuqiang Yang; Weihong Han; Bin Zhou; Liming Zheng; Jianfeng Zhang; Jinghu Xu; Dong Liu; Rongze Xia; Wenxia Wang; Yuanzheng Li


Archive | 2012

Integration and conversion system for network security data

Weihong Han; Yan Jia; Zhikun Chen; Jianfeng Zhang; Liming Zheng; Aiping Li; Bin Zhou; Shuqiang Yang; Jinghu Xu; Dong Liu; Guangyao Zhao

Collaboration


Dive into the Jianfeng Zhang's collaboration.

Top Co-Authors

Avatar

Yan Jia

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Weihong Han

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Liming Zheng

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Bin Zhou

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Fei Liu

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Jinghu Xu

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Dong Liu

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Rongze Xia

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Peng Zou

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Aiping Li

National University of Defense Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge