Jiang Xinghao
Shanghai Jiao Tong University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jiang Xinghao.
Journal of Systems Engineering and Electronics | 2008
Yi Ping; Jiang Xinghao; Wu Yue; Liu Ning
Abstract Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments.
Journal of Systems Engineering and Electronics | 2007
Yi Ping; Zou Futai; Jiang Xinghao; Li Jianhua
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermeasures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions. the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation.
Information Security and Communications Privacy | 2008
Jiang Xinghao
Archive | 2016
Sun Yanfeng; Jiang Xinghao; Shen Maying; Zheng Hui; Zhou Pei
Archive | 2016
Sun Yanfeng; Jiang Xinghao; Mi Yang; Zhou Pei; Jiang Hua
Archive | 2015
Sun Yanfeng; Jiang Xinghao; Cao Jinqi; Yu Hao; He Peisong
Journal of Shanghai Jiaotong University | 2010
Shi Shu-sen; Jiang Xinghao
Archive | 2017
Sun Tan-feng; Jiang Xinghao; Xu Ke
Archive | 2017
Jiang Xinghao; Sun Tan-feng; Zhao Yang
Archive | 2017
Jiang Xinghao; Sun Tan-feng; Xie Feng