Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Min Cai is active.

Publication


Featured researches published by Min Cai.


IEEE Transactions on Knowledge and Data Engineering | 2008

GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks

Runfang Zhou; Kai Hwang; Min Cai

In peer-to-peer (P2P) networks, reputation aggregation and ranking are the most time-consuming and space-demanding operations. This paper proposes a new gossip protocol for fast score aggregation. We developed a Bloom filter architecture for efficient score ranking. These techniques do not require any secure hashing or fast lookup mechanism, thus are applicable to both unstructured and structured P2P networks. We report the design principles and performance results of a simulated GossipTrust reputation system. Randomized gossiping with effective use of power nodes enables light-weight aggregation and fast dissemination of global scores in O(log2 n) time steps, where n is the P2P network size. The Gossip-based protocol is designed to tolerate dynamic peer joining and departure, as well as to avoid possible peer collusions. The scheme has a considerably low gossiping message overhead, i.e. O(n log2 n) messages for n nodes. Bloom filters demand at most 512 KB memory per node for a 10,000-node network. We evaluate the performance of GossipTrust with distributed P2P file-sharing and parameter-sweeping applications. The simulation results demonstrate that GossipTrust has small aggregation time, low memory demand, and high ranking accuracy. These results suggest promising advantages of using the GossipTrust system for trusted P2P applications.


IEEE Transactions on Dependable and Secure Computing | 2007

Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes

Kai Hwang; Min Cai; Ying Chen; Min Qin

This paper reports the design principles and evaluation results of a new experimental hybrid intrusion detection system (HIDS). This hybrid system combines the advantages of low false-positive rate of signature-based intrusion detection system (IDS) and the ability of anomaly detection system (ADS) to detect novel unknown attacks. By mining anomalous traffic episodes from Internet connections, we build an ADS that detects anomalies beyond the capabilities of signature-based SNORT or Bro systems. A weighted signature generation scheme is developed to integrate ADS with SNORT by extracting signatures from anomalies detected. HIDS extracts signatures from the output of ADS and adds them into the SNORT signature database for fast and accurate intrusion detection. By testing our HIDS scheme over real-life Internet trace data mixed with 10 days of Massachusetts Institute of Technology/Lincoln Laboratory (MIT/LL) attack data set, our experimental results show a 60 percent detection rate of the HIDS, compared with 30 percent and 22 percent in using the SNORT and Bro systems, respectively. This sharp increase in detection rate is obtained with less than 3 percent false alarms. The signatures generated by ADS upgrade the SNORT performance by 33 percent. The HIDS approach proves the vitality of detecting intrusions and anomalies, simultaneously, by automated data mining and signature generation over Internet connection episodes


ieee symposium on security and privacy | 2005

Collaborative Internet worm containment

Min Cai; Kai Hwang; Yu-Kwong Kwok; Shanshan Song; Yu Chen

Large-scale worm outbreaks that lead to distributed denial-of-service attacks pose a major threat to Internet infrastructure security. Fast worm containment is crucial for minimizing damage and preventing flooding attacks against network hosts.


acm special interest group on data communication | 2005

Fast and accurate traffic matrix measurement using adaptive cardinality counting

Min Cai; Jianping Pan; Yu-Kwong Kwok; Kai Hwang

Traffic matrix (TM) can be used to detect, identify, and trace network anomaly caused by DDoS attacks and worm outbreaks. To detect network anomaly as early as possible, we need to obtain TM in a fast and accurate manner. Many existing TM estimation techniques are found not sufficient for this purpose due to their high overhead or low accuracy. We propose a cardinality-based TM measurement approach with an adaptive counting algorithm to produce both packetlevel and flow-level TM, which is well-suited for TM-based anomaly detection on a network basis. Our results show that the approach can obtain TM in almost real-time (once very 10 seconds) with low average relative error (less than 5%). Our approach has low processing, storage and communication overhead, e.g. software implementation can support OC-192 line speed. It can also be implemented in a passive mode and deployed incrementally without changing current routing infrastructure.


IEEE Transactions on Dependable and Secure Computing | 2007

WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation

Min Cai; Kai Hwang; Jianping Pan; Christos Papadopoulos

Fast and accurate generation of worm signatures is essential to contain zero-day worms at the Internet scale. Recent work has shown that signature generation can be automated by analyzing the repetition of worm substrings (that is, fingerprints) and their address dispersion. However, at the early stage of a worm outbreak, individual edge networks are often short of enough worm exploits for generating accurate signatures. This paper presents both theoretical and experimental results on a collaborative worm signature generation system (WormShield) that employs distributed fingerprint filtering and aggregation over multiple edge networks. By analyzing real-life Internet traces, we discovered that fingerprints in background traffic exhibit a Zipf-like distribution. Due to this property, a distributed fingerprint filtering reduces the amount of aggregation traffic significantly. WormShield monitors utilize a new distributed aggregation tree (DAT) to compute global fingerprint statistics in a scalable and load-balanced fashion. We simulated a spectrum of scanning worms including CodeRed and Slammer by using realistic Internet configurations of about 100,000 edge networks. On average, 256 collaborative monitors generate the signature of CodeRedl-v2 135 times faster than using the same number of isolated monitors. In addition to speed gains, we observed less than 100 false signatures out of 18.7-Gbyte Internet traces, yielding a very low false-positive rate. Each monitor only generates about 0.6 kilobit per second of aggregation traffic, which is 0.003 percent of the 18 megabits per second link traffic sniffed. These results demonstrate that the WormShield system offers distinct advantages in speed gains, signature accuracy, and scalability for large-scale worm containment.


International Journal of Critical Infrastructures | 2006

DHT-based security infrastructure for trusted internet and grid computing

Kai Hwang; Min Cai; Yu-Kwong Kwok; Shanshan Song; Yu Chen; Ying Chen

We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Distributed Denial of Service (DDoS) attacks. The design is based on a novel Distributed Hash Table (DHT) for security enforcement among Grid sites scattered over the internet.


Concurrent Engineering | 2004

Performance of Networked XML-Driven Co-Operative Applications

Shahram Ghandeharizadeh; Christos Papadopoulos; Min Cai; Krishna Chintalapudi

Web services are an emerging software technology that employ XML, e.g., W3C’s SOAP [1], to share and exchange data. They are a building block of co-operative applications that communicate using a network. They may serve as wrappers for legacy data sources, integrate multiple remote data sources, filter information by processing queries (function shipping), etc. Web services are based on the concept of “software and data as a service.” With those that interact with an end user, a fast response time is the difference between the following two scenarios: (1) users issuing requests, retrieving their results, and visiting the service repeatedly, and (2) users issuing requests, waiting for response and walking away prior to retrieving their results, with a lower likelihood of issuing future requests for this web service. One may employ a middleware to enhance performance by minimizing the impact of transmission time. This is accomplished by compressing messages. This paper identifies factors that this middleware must consider in order to reduce response time. In particular, it must ensure the overhead of compression (increased CPU time) does not exceed its savings (lower transmission time).


International Journal of Web Services Research | 2005

NAM: A Network Adaptable Middleware to Enhance Response Time of Web Services

Shahram Ghandeharizadeh; Christos Papadopoulos; Min Cai; Runfang Zhou; Parikshit Pol

Web Services is an emerging software technology that is based on the concept of software and data as a service. Binary and XML are two popular encoding/decoding mechanisms for network messages. A Web Service may employ a loss-less compression technique (e.g., Zip, XMill, etc.) in order to reduce message size prior to its transmission across the network, minimizing its transmission time. This saving might be outweighed by the overhead of compressing the output of a Web Service at a server and decompressing it at a client. The primary contribution of this paper is NAM, a middleware that strikes a compromise between these two factors in order to enhance response time. NAM decides when to compress data, based on the available client and server processor speeds and network characteristics. When compared with today’s common practice to transmit the output of a Web Service uncompressed always, our experimental results show NAM either provides similar or significantly improved response times (at times, more than 90% improvement) with Internet connections that offer bandwidths ranging from 80 to 100 Mbps.


international conference on web services | 2003

Proteus: A System for Dynamically Composing and Intelligently Executing Web Services 1

Shahram Ghandeharizadeh; Craig A. Knoblock; Christos Papadopoulos; Cyrus Shahabi; Esam Alwagait; José Luis Ambite; Min Cai; Ching-Chien Chen; Parikshit Pol; Rolfe R. Schmidt; Saihong Song; Snehal Thakkar; Runfang Zhou


database and expert systems applications | 2002

A Comparison of Alternative Encoding Mechanisms for Web Services

Min Cai; Shahram Ghandeharizadeh; Rolfe R. Schmidt; Saihong Song

Collaboration


Dive into the Min Cai's collaboration.

Top Co-Authors

Avatar

Kai Hwang

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Shahram Ghandeharizadeh

University of Southern California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Runfang Zhou

University of Southern California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rolfe R. Schmidt

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Saihong Song

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Parikshit Pol

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Shanshan Song

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Ying Chen

University of Southern California

View shared research outputs
Researchain Logo
Decentralizing Knowledge