Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jing Tao is active.

Publication


Featured researches published by Jing Tao.


annual computer security applications conference | 2012

Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service

Shuang Zhao; Patrick P. C. Lee; John C. S. Lui; Xiaohong Guan; Xiaobo Ma; Jing Tao

Given the popularity of smartphones and mobile devices, mobile botnets are becoming an emerging threat to users and network operators. We propose a new form of cloud-based push-styled mobile botnets that exploits todays push notification services as a means of command dissemination. To motivate its practicality, we present a new command and control (C&C) channel using Googles Cloud to Device Messaging (C2DM) service, and develop a C2DM botnet specifically for the Android platform. We present strategies to enhance its scalability to large botnet coverage and its resilience against service disruption. We prototype a C2DM botnet, and perform evaluation to show that the C2DM botnet is stealthy in generating heartbeat and command traffic, resource-efficient in bandwidth and power consumptions, and controllable in quickly delivering a command to all bots. We also discuss how one may deploy a C2DM botnet, and demonstrate its feasibility in launching an SMS-Spam-and-Click attack. Lastly, we discuss how to generalize the design to other platforms, such as iOS or Window-based systems, and recommend possible defense methods. Given the wide adoption of push notification services, we believe that this type of mobile botnets requires special attention from our community.


international conference on communications | 2010

A Novel IRC Botnet Detection Method Based on Packet Size Sequence

Xiaobo Ma; Xiaohong Guan; Jing Tao; Qinghua Zheng; Yun Guo; Lu Liu; Shuang Zhao

Botnets have become a serious threat to Internet and are often deployed to control a large pool of zombies and perform notorious activities such as DDoS, information theft and spam sending. In this paper, a new method is developed for detecting IRC botnets by analyzing the characteristic of packet size sequence of the TCP conversation between IRC zombies and their command and control (C&C) servers. In comparison with IRC chat, the TCP conversations within IRC botnets show a nature of approximate periodicity defined as quasi-periodicity in this paper. A simple yet effective detection method is presented to detect IRC botnets by measuring the quasi-periodicity degree and packet average size of IRC conversations based on ukkonen algorithm. We evaluated our method using real-world IRC botnet traces captured from honeynet. The results show that our method can detect real-world IRC botnets from IRC traffic with high accuracy and has a low false positive rate.


international conference on computer communications and networks | 2014

MIGDroid: Detecting APP-Repackaging Android malware via method invocation graph

Wenjun Hu; Jing Tao; Xiaobo Ma; Wenyu Zhou; Shuang Zhao; Ting Han

With the increasing popularity of Android platform, Android malware, especially APP-Repackaging malware wherein the malicious code is injected into legitimate Android applications, is spreading rapidly. This paper proposes a new system named MIGDroid, which leverages method invocation graph based static analysis to detect APP-Repackaging Android malware. The method invocation graph reflects the “interaction” connections between different methods. Such graph can be naturally exploited to detect APP-Repackaging malware because the connections between injected malicious code and legitimate applications are expected to be weak. Specifically, MIGDroid first constructs method invocation graph on the smali code level, and then divides the method invocation graph into weakly connected sub-graphs. To determine which sub-graph corresponds to the injected malicious code, the threat score is calculated for each sub-graph based on the invoked sensitive APIs, and the subgraphs with higher scores will be more likely to be malicious. Experiment results based on 1,260 Android malware samples in the real world demonstrate the specialty of our system in detecting APP-Repackaging Android malware, thereby well complementing existing static analysis systems (e.g., Androguard) that do not focus on APP-Repackaging Android malware.


IEEE Transactions on Information Forensics and Security | 2014

DNSRadar: Outsourcing Malicious Domain Detection Based on Distributed Cache-Footprints

Xiaobo Ma; Junjie Zhang; Jing Tao; Jianfeng Li; Jue Tian; Xiaohong Guan

As the domain name system (DNS) plays a critical role in malicious services and number of networks, especially small enterprise networks and home networks that are generally and poorly managed, grows rapidly, it is highly desired to outsource the malicious domain detection service to a thirdparty system that can aggregate information from multiple vantage points to perform detection. To this end, we propose DNSRadar, a system that explores the coexistence of domain cache-footprints distributed in all networks that participate in the outsourcing service. Bootstrapping from a list of prelabeled malicious domains, DNSRadar leverages link analysis techniques to infer maliciousness likelihood of unknown domains based on coexistence information. As DNSRadar only uses the existence of an unknown domain in a network for detection, privacy concerns have been drastically reduced. Both MapReduce and lightweight matrix analysis techniques are employed to implement DNSRadar, making scalability as a built-in feature. Taking advantage of a large number of open recursive DNS servers, we have performed extensive evaluation at scale. Experimental results have demonstrated that DNSRadar can efficiently detect ~90% malicious domains given a low false positive rate of 1%. Of all these detected malicious domains, ~30% are on average 6 days earlier than public DNS reputation services, indicating DNSRadars great early detection capability.


Journal of Network and Computer Applications | 2015

Accurate DNS query characteristics estimation via active probing

Xiaobo Ma; Junjie Zhang; Zhenhua Li; Jianfeng Li; Jing Tao; Xiaohong Guan; John C. S. Lui; Donald F. Towsley

As the hidden backbone of todays Internet, the Domain Name System (DNS) provides name resolution service for almost every networked application. To exploit the rich DNS query information for traffic engineering or user behavior analysis, both passive capturing and active probing techniques have been proposed in recent years. Despite its full visibility of DNS behaviors, the passive capturing technique suffers from prohibitive management cost and results in tremendous privacy concerns towards its large-scale and collaborative deployment. Comparatively, the active probing technique overcomes these limitations, providing broad-view and privacy-preserving DNS query analysis at the cost of constrained visibility of fine-grained DNS behavior. This paper aims to accurately estimate DNS query characteristics based on DNS cache activities, which can be acquired via active probing on a large scale at negligible management cost and minimized privacy concerns. Specifically, we have made three contributions: (1) we propose a novel solution, which integrates the renewal theory-based DNS caching formulation and the hyper-exponential distribution model. The solution offers great flexibility to model various domains; (2) we perform a large-scale real-world DNS trace measurement, and demonstrate that our solution significantly improves the estimation accuracy; (3) we apply our solution to estimate the malware-infected host population in remote management networks. The experimental results have demonstrated that our solution can achieve high estimation accuracy and outperforms the existing method.


IEEE Transactions on Knowledge and Data Engineering | 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs

Pinghui Wang; Junzhou Zhao; Xiangliang Zhang; Zhenguo Li; Jiefeng Cheng; John C. S. Lui; Donald F. Towsley; Jing Tao; Xiaohong Guan

Counting 3-, 4-, and 5-node graphlets in graphs is important for graph mining applications such as discovering abnormal/evolution patterns in social and biology networks. In addition, it is recently widely used for computing similarities between graphs and graph classification applications such as protein function prediction and malware detection. However, it is challenging to compute these graphlet counts for a large graph or a large set of graphs due to the combinatorial nature of the problem. Despite recent efforts in counting 3-node and 4-node graphlets, little attention has been paid to characterizing 5-node graphlets. In this paper, we develop a computationally efficient sampling method to estimate 5-node graphlet counts. We not only provide a fast sampling method and unbiased estimators of graphlet counts, but also derive simple yet exact formulas for the variances of the estimators which are of great value in practice—the variances can be used to bound the estimates’ errors and determine the smallest necessary sampling budget for a desired accuracy. We conduct experiments on a variety of real-world datasets, and the results show that our method is several orders of magnitude faster than the state-of-the-art methods with the same accuracy.


world congress on intelligent control and automation | 2010

Honeynet-based collaborative defense using improved highly predictive blacklisting algorithm

Xiaobo Ma; Jiahong Zhu; Zhiyu Wan; Jing Tao; Xiaohong Guan; Qinghua Zheng

We present a honeynet-based collaborative defense framework and an improved highly predictive blacklisting algorithm is developed to generate highly personalized and predictive blacklists for individual networks by correlating historic attackers captured by honeynet deployed in each network. In this way, different networks can defend new attackers in a collaborative way because one network will notify another network, by dint of honeynet, of the most probable attackers in the near future based on their historic correlation. A relatively proactive defense strategy is realized based on honeynet in a collaborative way and we evaluated our algorithm with real-world honeynet traces captured in different subnets. The results show our method can generate highly personalized and predictive blacklists for individual networks with a high hit rate and defense rate.


Information Sciences | 2017

Mining repeating pattern in packet arrivals

Jianfeng Li; Xiaobo Ma; Junjie Zhang; Jing Tao; Pinghui Wang; Xiaohong Guan

A substantial portion of the network traffic can be attributed to autonomous network applications that experience repeating networking patterns. This observation is further signified by the emergence of the Internet of Things (IoT) era that features an enormous number of networked, autonomous sensors. Identifying and characterizing repeating patterns therefore become a critical means to Internet measurement and traffic engineering. In this paper, we propose a novel method that can effectively identify and characterize timing-based repeating patterns from network traffic by overcoming three significant practical challenges, including i) time-scale sensitive, ii) transience, and iii) being interleaved by noises. Our method features a novel metric, namely unpredictability index (UPI), to capture repeating patterns by quantifying the predictability of packet arrivals temporal structure from the perspective of hierarchical clustering. An online approach is further developed to incrementally compute UPI upon observing a single packet. Extensive experiments based on synthetic and real-world data have demonstrated that our method can effectively conduct repeating pattern mining.


global communications conference | 2012

Towards active measurement for DNS query behavior of botnets

Xiaobo Ma; Jianfeng Li; Jing Tao; Xiaohong Guan

Domain names play an increasingly important role for the botnet activities. Traditionally, DNS traces from several local DNS servers are used passively to measure the DNS query behavior. However, since botnets are a wide-scale threat and usually reside in geographically dispersed networks, the vantage point of several local DNS servers is sometimes too small to help us understand the DNS query behavior (e.g., whether queried or not, average query rate) of botnets. In this paper, we actively measure the DNS query behavior of botnets in geographically dispersed networks via the DNS cache probing technique. We first analytically characterize how multiple domain names are queried by botnets in different networks under certain circumstances. Then, we actively measure real botnet samples in the wild to gain insight into how multiple domain names are queried by botnets in 480 geographically dispersed networks globally, and show that our analytical characterization well describes the DNS query behavior of the botnet samples. The active measurement technique can help to acquire extensive DNS query information in different networks and thus potentially facilitate various DNS-related research and applications.


Information Sciences | 2017

AL-bitmap

Jing Tao; Pinghui Wang; Xiaohong Guan; Wenjun Hu

Monitoring traffic activity graphs (TAGs) is important for traditional networks and software defined networks. However, it is challenging to compute TAGs on high speed links in realtime by using routers very fast but expensive static RAM (SRAM). In this paper, we develop a new method, AL-bitmap (AL stands for adaptive length), to build an accurate yet compact traffic summary. Compared to previous bitmap methods, AL-bitmap generates a bitmap with adaptive length for each host, that is, the bitmaps length automatically increases with the number of hosts that the host connects to. This enables us to accurately measure the statistics of TAGs with a small memory usage of SRAM. We evaluate our methods on publicly available real network traffic, and the experimental results show that AL-bitmap is computational and memory efficient for monitoring traffic on high speed routers, and it is significantly more accurate than state-of-the-art methods.

Collaboration


Dive into the Jing Tao's collaboration.

Top Co-Authors

Avatar

Xiaohong Guan

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Pinghui Wang

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Xiaobo Ma

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Jianfeng Li

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Junzhou Zhao

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

John C. S. Lui

The Chinese University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar

Donald F. Towsley

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar

Junjie Zhang

Wright State University

View shared research outputs
Top Co-Authors

Avatar

Lu Liu

Xi'an Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Qinghua Zheng

Xi'an Jiaotong University

View shared research outputs
Researchain Logo
Decentralizing Knowledge