Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Wei Zou is active.

Publication


Featured researches published by Wei Zou.


WEIS | 2009

Studying Malicious Websites and the Underground Economy on the Chinese Web

Jianwei Zhuge; Thorsten Holz; Chengyu Song; Jinpeng Guo; Xinhui Han; Wei Zou

The World Wide Web gains more and more popularity within China with more than 1.31 million websites on the Chinese Web in June 2007. Driven by the economic profits, cyber criminals are on the rise and use the Web to exploit innocent users. In fact, a real underground black market with thousands of parti cipants has developed, which brings together malicious users who trade exploits, malware, virtual assets, stolen credentials, and more. In this chapter, we provide a detailed overview of this underground black market and present a model to describe the market. We substantiate our model with the help of measurement results within the Chinese Web. First, we show that the amount of virtual assets traded on this underground market is huge. Second, our research proves that a significant amount of websites within China’s part of the Web contain some kind of malicious content: our measurements reveal that about 1.49% of the examined sites contain malicious content that tries to attack the visitor’s browser.


international conference on information and communication security | 2007

Collecting autonomous spreading malware using high-interaction honeypots

Jianwei Zhuge; Thorsten Holz; Xinhui Han; Chengyu Song; Wei Zou

Autonomous spreading malware in the form of worms or bots has become a severe threat in todays Internet. Collecting the sample as early as possible is a necessary precondition for the further treatment of the spreading malware, e.g., to develop antivirus signatures. In this paper, we present an integrated toolkit called HoneyBow, which is able to collect autonomous spreading malware in an automated manner using high-interaction honeypots. Compared to low-interaction honeypots, HoneyBow has several advantages due to a wider range of captured samples and the capability of collecting malware which propagates by exploiting new vulnerabilities. We validate the properties of HoneyBow with experimental data collected during a period of about nine months, in which we collected thousands of malware binaries. Furthermore, we demonstrate the capability of collecting new malware via a case study of a certain bot.


2006 IEEE Information Assurance Workshop | 2006

Towards High Level Attack Scenario Graph through Honeynet Data Correlation Analysis

Jianwei Zhuge; Xinhui Han; Yu Chen; Zhiyuan Ye; Wei Zou

Honeynet data analysis has become a core requirement of honeynet technology. However, current honeynet data analysis mechanisms are still unable to provide security analysts enough capacities of comprehend the captured data quickly, in particular, there is no work done on behavior level correlation analysis. Towards providing high level attack scenario graphs, in this paper, we propose a honeynet data correlation analysis model and method. Based on a network attack and defense knowledge base and network environment perceiving mechanism, our proposed honeynet data correlation analysis method can recognize the attacker/s plan from a large volume of captured data and consequently reconstruct attack scenarios. Two proof-of-concept experiments on Scan of the Month 27 dataset and in-the-wild botnet scenarios are presented to show the effectiveness of our method


Archive | 2010

Method and system for detecting large-scale malicious web pages

Zhiyin Liang; Xiaorui Gong; Tao Wei; Chengyu Song; Xinfeng Wu; Xinhui Han; Jianwei Zhuge; Wei Zou


Archive | 2010

Method for automatically positioning webpage Trojan mount point in Trojan linked webpage

Xiaorui Gong; Zhiyin Liang; Tao Wei; Wei Zou


Archive | 2007

Multi-layer honey network data transmission method and system

Tao Wei; Zhiyin Liang; Xinhui Han; Jianwei Zhuge; Wei Zou; Zhiyuan Ye; Hongyu You


Archive | 2008

Malevolence code automatic recognition method

Zhiyin Liang; Tao Wei; Wei Zou; Xinhui Han; Jianwei Zhuge; Yu Chen


Archive | 2010

Method for constructing lightweight webpage dynamic view

Xiaorui Gong; Xinhui Han; Chengyu Song; Huilin Zhang; Jianwei Zhuge; Wei Zou


Archive | 2012

Botnet family detection method based on active probing

Xinhui Han; Huilin Zhang; Xiaorui Gong; Wei Zou; Tao Wei


Archive | 2008

Redirection method and device for real time monitoring network activities

Tao Wei; Jianwei Zhuge; Xinhui Han; Wei Zou; Zhiyuan Ye; Hongyu You; Jinpeng Guo

Collaboration


Dive into the Wei Zou's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chengyu Song

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Jinpeng Guo

University of Mannheim

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge