Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Liumei Zhang is active.

Publication


Featured researches published by Liumei Zhang.


International Journal of Grid and Utility Computing | 2016

Efficiency optimisation signature scheme for time-critical multicast data origin authentication

Yichuan Wang; Jianfeng Ma; Xiang Lu; Di Lu; Liumei Zhang

A great challenge of providing authentication to time-critical multicast data is the existence of low end-to-end delay in many applications such as pay-TV and the power grid scenarios. Consequently, to balance security and efficiency is still a difficult issue. The group of secret keys reused scheme of TV-HORS still cannot meet the requirements of low time delay of computation. To describe the relationship between security and efficiency for the time-critical multicast communication scenarios, we present a Game Model of Multicast Data Origin Authentication, in this paper. By analysing our model with Shannons information and game theory, we propose an optimised re-keying scheme, contraposing the TV-HORS scheme. The advantage of breaking the security goal is negligible, even in the lowest risk-level parameter. The experiment results show that our scheme does significantly promote the efficiency of TV-HORS scheme and is the most efficient multicast data origin authentication signature scheme.


Cluster Computing | 2014

From high-availability to collapse: quantitative analysis of Cloud-Droplet-Freezing attack threats to virtual machine migration in cloud computing

Yichuan Wang; Jianfeng Ma; Di Lu; Xiang Lu; Liumei Zhang

Virtual machines (VM) migration can improve availability, manageability, performance and fault tolerance of systems. Current migration researches mainly focus on the promotion of the efficiency by using shared storage, priority-based policy etc.. But the effect of migration is not well concerned. In fact, once physical servers are overloaded from denial-of-service attack (DDoS) attack, a hasty migration operation not only unable to alleviate the harm of the attack, but also increases the harmfulness. In this paper, a novel DDoS attack, Cloud-Droplet-Freezing (CDF) attack, is described according to the characteristics of cloud computing cluster. Our experiments show that such attack is able to congest internal network communication of cloud server cluster, whilst consume resources of physical server. Base on the analysis of CDF attack, we highlight the method of evaluating potential threats hidden behind the normal VM migration and analyze the flaws of existing intrusion detection systems/prevention system for defensing the CDF attack.


Information Sciences | 2013

A rational framework for secure communication

Youliang Tian; Jianfeng Ma; Changgen Peng; Yichuan Wang; Liumei Zhang

Abstract In this paper, we review the classical secure communication issues, which is always described as a set of interactive rules following a specified sequence, in the perspective of game theory. By introducing rational communication participants, we model the secure communication process in the manner of game theory to capture the interactions of distrusted communication parties. More specifically, we propose a formal framework to provide a precise description of the computation and communication rules in a secure communication game. Each player tends to behave in a way that maximizes their profits in this framework. Following the framework, the fairness of a protocol is presented according to Nash equilibrium of the communication game, as well as the equivalence condition towards a fair protocol. To verify the effectiveness of this framework, we design and implement a series of experiments. The experimental results show that our rational framework is more secure and closer to the practice compared with traditional cryptographic models, which can be a promising analysis solution for future cryptographic protocols.


computational intelligence and security | 2011

PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction

Liumei Zhang; Jianfeng Ma; Yichuan Wang; Shaowei Pan

In compare with the traditional Artificial Neural Network, PSO-BP neutral network has fast convergence and is immune to local minimum. This paper presents an application of PSO-BP neural network for dynamic predicting small layer reservoir parameters of fault block E1f11-1 in well ZHuang 2. By defining input and output neuron number, our method firstly realizes quantization of input neuron. Then we choose proper samples for training neural network in order to build a dynamic prediction model of reservoir parameters. Such model has been successfully tested and the model itself is appropriate for predicting unknown reservoir parameters. Testing result indicates that PSO-BP neural network is superior to the genetic algorithm optimized BP neural network and the pure neural network. Finally, PSO-BP neural network gained certain achievements for dynamically predicting reservoir parameters according as dynamic production information.


Security and Communication Networks | 2016

Dynamic game model of botnet DDoS attack and defense

Yichuan Wang; Jianfeng Ma; Liumei Zhang; Wenjiang Ji; Di Lu; Xinhong Hei

Botnet has become a popular technique for deploying Internet crimes. The command of botnet has evolved into a major way for attackers to launch Distributed Denial of Service attacks on network servers. Modelized analysis methods need to be studied for botnet attacks implements, defense, and prediction. In this paper, we propose a novel game theory-based model to describe the scenario, in which the botmaster launching Distributed Denial of Service attacks using a botnet while the defender equipped a firewall defending. In our model, we consider the following: firstly, the botmaster and the defender can be rational or irrational; secondly, the interaction between the botmaster and the defender is modeled as a dynamic game; thirdly, their supporting or not self-learning databases. We detail the analysis of eight sub-scenarios for the assumptions and give an easy-to-use algorithm for adjustment of offensive and defensive strategy. We use the OPNET to validate our model and its effectiveness. The experiment result shows that our strategy can improve the firewall abilities to lower false alarm rate FR and improve the botmaster lower exposure rate of botnet to avoid detection. Furthermore, the model is helpful to evaluate defense ability of the defender towards current botmaster attacks by analyzing attack log in sandbox. Copyright


The Open Cybernetics & Systemics Journal | 2014

Towards Secure P2P Network: Degenerated Node Identification and Evaluation

Liumei Zhang; Jianfeng Ma; Yichuan Wang; Di Lu

The security improvement of service provided by peer-to-peer (P2P) network has been widely studied. Se- curity issue of P2P is mainly related to the users of P2P services and threat of malicious software. Especially, some malicious software could threaten other P2P users and even threaten the security of the entire P2P network. In this paper, based on the analytical hierarchy process, a degenerated node evaluation model has been proposed to evaluate the node resource usage of the P2P. Moreover, an attribute clustering based collaborative filtering algorithm is de- picted for calculating the similarities between the identified degenerated node and all other nodes within a hybrid autonomous cluster. The algorithm utilizes similarity characteristics of node task resource attributes, especially CPU related attributes, to filter redundant data by feature selection. Experiments show that, the proposed model and method is feasible and has the vital significance for providing decision support and recommendation to the search node. It is practical for secure computing of P2P network.


intelligent networking and collaborative systems | 2013

Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency

Yichuan Wang; Jianfeng Ma; Di Lu; Liumei Zhang; Xiang Lu

Security and efficiency of messages transmission are crucial requirements for multicast data origin authentication, especially in time-critical scenarios, such as pay-TV and the smart grid. However, how to balance such equirements is still a difficult issue. Through analysis, we find that TV-HORS is more suitable for the time-critical scenarios than RSA-based and MAC-based scheme. However, the reuse times of TV-HORS scheme is still too small to suit some scenarios. In this paper, we present a Game Model of Multicast Data Origin Authentication (GMMDOA), to describe the relationship between security and efficiency for the time-critical multicast communication, contra posing the TV-HORS scheme. By analyzing our model with Shannons information and game theory, we propose an optimization scheme for update the private key. Through the security analysis of our model, the signature valid time is negligible compared with the adversary attacking time. Thus, the security of our scheme is still secure even in the lowest risk-level parameter. We present measurement results from experiments and discuss performance comparisons. It shows that, our scheme does significantly to promote the efficiency of multicast data origin authentication.


Computing and Informatics \/ Computers and Artificial Intelligence | 2018

AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud

Liumei Zhang; Jianfeng Ma; Tianshi Liu; Yichuan Wang; Di Lu


international conference on advanced computer control | 2014

A virtual machine migration scheme toward Green Cloud

Liumei Zhang; Jianfeng Ma; Di Lu; Yichuan Wang


BioTechnology: An Indian Journal | 2014

Towards green cloud computing: Migrate virtual machine identification and evaluation

Liumei Zhang; Jianfeng Ma; Yichuan Wang; Di Lu

Collaboration


Dive into the Liumei Zhang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xiang Lu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wenjiang Ji

Civil Aviation University of China

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge