Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tianzuo Wang is active.

Publication


Featured researches published by Tianzuo Wang.


Ksii Transactions on Internet and Information Systems | 2012

Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets

Tianzuo Wang; Huaimin Wang; Bo Liu; Bo Ding; Jing Zhang; Peichang Shi

Sybil attack has been proved effective in mitigating the P2P botnet, but the impacts of some important parameters were not studied, and no model to estimate the effectiveness was proposed. In this paper, taking Kademlia-based botnets as the example, the model which has the upper and lower bound to estimate the mitigating performance of the Sybil attack is proposed. Through simulation, how three important factors affect the performance of the Sybil attack is analyzed, which is proved consistent with the model. The simulation results not only confirm that for P2P botnets in large scale, the Sybil attack is an effective countermeasure, but also imply that the model can give suggestions for the deployment of Sybil nodes to get the ideal performance in mitigating the P2P botnet.


trust security and privacy in computing and communications | 2013

What is the Pattern of a Botnet

Tianzuo Wang; Huaimin Wang; Bo Liu; Peichang Shi

As complex, flexible and efficient platforms for network attacks, botnets are considered as one of the most serious threats to current Internet security. The evolution and diversification of botnets call for a clear and fine grained taxonomy, but existing taxonomies are either incomplete or overlapping. In order to classify botnets accurately, we propose a concept called control structure to exactly and uniformly describe how botnets are controlled by botmasters. From the point of control structure, we classify botnets into certain patterns. Our taxonomy not only helps to understand botnets better, but also is useful for defenders when considering how to take down a botnet. Further, through comparison between different patterns, we predict that the P pattern and F-(O, P) pattern would be the most important trends for botnets, and the F layer would less likely appear without a P layer.


Chinese Journal of Computers | 2012

Some Critical Problems of Botnets

Tianzuo Wang; Huaimin Wang; Bo Liu; Peichang Shi

As a complex,flexible and effective platform for network attacking,the botnet spreads widely in the Internet.Botnets can provide the botmasters with the ability to launch large-scale malicious activities such as spamming and DDoS(Distributed Denial of Service) attacks.Botnets are continuously bringing more and more severe threats,so that the study on botnets has already become one of the focuses in the field of network security.However,in recent years,some new developments of botnets are challenging the existing understanding on botnets.In this paper,according to the new conditions of botnets and the researches in existence,a definition of botnet is proposed based on the works of other researchers,taxonomies of botnets are introduced respectively from the views of network structure,dependency and delivery pattern of CC(Command and Control) information.Then the techniques on detecting,measuring and restraining botnets are analyzed systematically.In the end,we give the evolution trends of botnets and the future research trends in this area.


International Journal on Advances in Information Sciences and Service Sciences | 2012

Prediction-based Federated Management of Multi-scale Resources in Cloud

Peichang Shi; Huaimin Wang; Gang Yin; Fengshun Lu; Tianzuo Wang


International Journal on Advances in Information Sciences and Service Sciences | 2011

The Prediction Model Based on RBF Network in Achieving Elastic Cloud

Peichang Shi; Huaimin Wang; Bo Ding; Ran Liu; Tianzuo Wang


Journal of Convergence Information Technology | 2012

Development of Research on Botnet Defenses, From the Viewpoint of Botnet Lifecycle

Bo Liu; Xiaolong Ma; Tianzuo Wang; Jing Zhang; Fang Yang


Journal of Convergence Information Technology | 2013

Find Better Eliminating Strategies to Restrain Structured P2P Botnets

Tianzuo Wang; Huaimin Wang; Bo Liu; Peichang Shi; Xiaolong Ma


Computing and Convergence Technology (ICCCT), 2012 7th International Conference on | 2013

A study of strategies to restrain the C&C activities of structured P2P botnets

Tianzuo Wang; Bo Liu; Huaimin Wang; Hao Ren; Xiaolong Ma


Ksii Transactions on Internet and Information Systems | 2012

CDN Scalability Improvement using a Moderate Peer-assisted Method

Peichang Shi; Huaimin Wang; Hao Yin; Bo Ding; Tianzuo Wang; Miao Wang


Journal of Convergence Information Technology | 2012

Which Strategy is Better to Restrain C&C Activities of Unstructured P2P Botnets?

Tianzuo Wang; Huaimin Wang; Bo Liu; Peichang Shi

Collaboration


Dive into the Tianzuo Wang's collaboration.

Top Co-Authors

Avatar

Peichang Shi

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Bo Liu

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Bo Ding

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Huaimin Wang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Xiaolong Ma

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Jing Zhang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Fengshun Lu

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Gang Yin

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Hao Ren

National University of Defense Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge