Tianzuo Wang
National University of Defense Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Tianzuo Wang.
Ksii Transactions on Internet and Information Systems | 2012
Tianzuo Wang; Huaimin Wang; Bo Liu; Bo Ding; Jing Zhang; Peichang Shi
Sybil attack has been proved effective in mitigating the P2P botnet, but the impacts of some important parameters were not studied, and no model to estimate the effectiveness was proposed. In this paper, taking Kademlia-based botnets as the example, the model which has the upper and lower bound to estimate the mitigating performance of the Sybil attack is proposed. Through simulation, how three important factors affect the performance of the Sybil attack is analyzed, which is proved consistent with the model. The simulation results not only confirm that for P2P botnets in large scale, the Sybil attack is an effective countermeasure, but also imply that the model can give suggestions for the deployment of Sybil nodes to get the ideal performance in mitigating the P2P botnet.
trust security and privacy in computing and communications | 2013
Tianzuo Wang; Huaimin Wang; Bo Liu; Peichang Shi
As complex, flexible and efficient platforms for network attacks, botnets are considered as one of the most serious threats to current Internet security. The evolution and diversification of botnets call for a clear and fine grained taxonomy, but existing taxonomies are either incomplete or overlapping. In order to classify botnets accurately, we propose a concept called control structure to exactly and uniformly describe how botnets are controlled by botmasters. From the point of control structure, we classify botnets into certain patterns. Our taxonomy not only helps to understand botnets better, but also is useful for defenders when considering how to take down a botnet. Further, through comparison between different patterns, we predict that the P pattern and F-(O, P) pattern would be the most important trends for botnets, and the F layer would less likely appear without a P layer.
Chinese Journal of Computers | 2012
Tianzuo Wang; Huaimin Wang; Bo Liu; Peichang Shi
As a complex,flexible and effective platform for network attacking,the botnet spreads widely in the Internet.Botnets can provide the botmasters with the ability to launch large-scale malicious activities such as spamming and DDoS(Distributed Denial of Service) attacks.Botnets are continuously bringing more and more severe threats,so that the study on botnets has already become one of the focuses in the field of network security.However,in recent years,some new developments of botnets are challenging the existing understanding on botnets.In this paper,according to the new conditions of botnets and the researches in existence,a definition of botnet is proposed based on the works of other researchers,taxonomies of botnets are introduced respectively from the views of network structure,dependency and delivery pattern of CC(Command and Control) information.Then the techniques on detecting,measuring and restraining botnets are analyzed systematically.In the end,we give the evolution trends of botnets and the future research trends in this area.
International Journal on Advances in Information Sciences and Service Sciences | 2012
Peichang Shi; Huaimin Wang; Gang Yin; Fengshun Lu; Tianzuo Wang
International Journal on Advances in Information Sciences and Service Sciences | 2011
Peichang Shi; Huaimin Wang; Bo Ding; Ran Liu; Tianzuo Wang
Journal of Convergence Information Technology | 2012
Bo Liu; Xiaolong Ma; Tianzuo Wang; Jing Zhang; Fang Yang
Journal of Convergence Information Technology | 2013
Tianzuo Wang; Huaimin Wang; Bo Liu; Peichang Shi; Xiaolong Ma
Computing and Convergence Technology (ICCCT), 2012 7th International Conference on | 2013
Tianzuo Wang; Bo Liu; Huaimin Wang; Hao Ren; Xiaolong Ma
Ksii Transactions on Internet and Information Systems | 2012
Peichang Shi; Huaimin Wang; Hao Yin; Bo Ding; Tianzuo Wang; Miao Wang
Journal of Convergence Information Technology | 2012
Tianzuo Wang; Huaimin Wang; Bo Liu; Peichang Shi