Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lai Yingxu is active.

Publication


Featured researches published by Lai Yingxu.


international symposium on autonomous decentralized systems | 2017

Intrusion Detection of Industrial Control System Based on Modbus TCP Protocol

Wang Yusheng; Fan Kefeng; Lai Yingxu; Liu Zenghui; Zhou Ruikang; Yao Xiangzhen; Li Lin

Modbus over TCP/IP is one of the most popular industrial network protocol that are widely used in critical infrastructures. However, vulnerability of Modbus TCP protocol has attracted widely concern in the public. The traditional intrusion detection methods can identify some intrusion behaviors, but there are still some problems. In this paper, we present an innovative approach, SD-IDS (Stereo Depth IDS), which is designed for perform real-time deep inspection for Modbus TCP traffic. SD-IDS algorithm is composed of two parts: rule extraction and deep inspection. The rule extraction module not only analyzes the characteristics of industrial traffic, but also explores the semantic relationship among the key field in the Modbus TCP protocol. The deep inspection module is based on rule-based anomaly intrusion detection. Furthermore, we use the online test to evaluate the performance of our SD-IDS system. Our approach get a low rate of false positive and false negative.


Archive | 2016

Software Behavior Analysis Method Based on Behavior Template

Lai Yingxu; Zhao Yiwen; Ye Tao

Software security is not only related to our life, but also close to the security of our society. This paper proposed a method called software behaviors analysis method based on behavior template (SABT). According to the context of source code, we build and form a behavior template as a system to detect malicious behavior of software, including function transfer map and function block transfer map. We utilize some relative algorithms and technology in SABT, which include the method of stubbing interrupts, building behavior template and forming automaton to detect abnormal software behavior. Behavior template consists of function transfer map and minimum function transfer map. Compared with traditional method, such as N-gram, FSA, Var-gram, SABT can get higher cover rate of code and detect abnormal more effetely and efficiently.


international symposium on autonomous decentralized systems | 2015

Analysis of Industrial Control Systems Traffic Based on Time Series

Lai Yingxu; Jiao Jiao; Liu Jing

With the growing demand of location-independent access to Industrial Control Systems (ICS), anomaly detection scheme for industrial Ethernet which highly satisfied with demanding real-time and reliable industrial applications becomes one of the problems in ICS. In this paper, we present an innovative approach to build a traffic model based on structural time series model. Basic structural model which decomposes time series into four factors is established by the stationary analysis of industrial traffic. Parameters in the model are identified by state space model which is conducted from the training sequence using standard Kalman filter recursions and EM algorithm. Furthermore, performance of state space model is evaluated by the experimental comparative results that confirm significant improvement in detection accuracy and the validity of abnormal data localization.


ieee international conference on high performance computing data and analytics | 2012

Study and Implementation of Trust Evaluation Access Control Mechanism Based on XEN

Lai Yingxu; Wang Ruozeng; Yang Zhen

With the use of virtualization, threats appears gradually in domains constituted by host and virtual machines (VMs). Access control between VMs becomes a necessary method of the security management of virtualized platform. The traditional Mandatory Access Control (MAC) based on fixed security policy is greatly restricted on flexibility. In this paper, we proposed a quantitatively trust evaluation method based on VMs historical behavior, which combined with existing MAC mechanism, to build a flexible, fine-grained access control mechanism.


Archive | 2014

Computer-assisted computing method of semantic distance between short texts

Yang Zhen; Wang Laitao; Lai Yingxu; Gao Kaiming; Zhang Longbo; Duan Lijuan; Fan Kefeng


Archive | 2015

Anomaly detection method based on network flow analysis

Lai Yingxu; Li Xiulong; Yang Zhen; Liu Jing; Li Jian


Archive | 2014

Method of tracing software abnormal behaviors based on software functional layer

Lai Yingxu; Huo Shuxiao; Yang Zhen; Li Jian


Archive | 2013

Detection method for malicious application software on mobile terminal

Lai Yingxu; Qiao Jingjing; Yang Zhen; Liu Jing; Li Jian; Xu Zhuangzhuang


Journal of Beijing University of Technology | 2010

Online Public Opinion Hotspot Detection and Analysis Based on Short Text Clustering Using String Distance

Lai Yingxu


Archive | 2014

Abnormality detecting method based on industrial control system network traffic

Lai Yingxu; Gao Chunmei; Yang Zhen; Li Jian

Collaboration


Dive into the Lai Yingxu's collaboration.

Top Co-Authors

Avatar

Liu Jing

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Yang Zhen

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Wang Yusheng

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jiao Jiao

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Li Yajuan

Dalian Ocean University

View shared research outputs
Top Co-Authors

Avatar

Wang Ruozeng

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ye Tao

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Zhao Yiwen

Beijing University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge