Xiaohong Yuan
North Carolina Agricultural and Technical State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Xiaohong Yuan.
southeastcon | 2016
Yogeshwar Rao Bachupally; Xiaohong Yuan; Kaushik Roy
With the evolution of networks, threats or attacks with the intention of disrupting service or stealing confidential data are increasing tremendously. Networks have to be monitored constantly and protected against attacks. In this paper, a new method to analyze network traffic using Big Data techniques is introduced. This approach detects anomalous activities being carried out and malicious data being transmitted over the networks through processing and loading traffic data into Hive database in Hadoop Distributed File System (HDFS) environment, and analyzing the data using Hive queries. The results of using this method to detect attacks on the sample dataset are also presented.
southeastcon | 2016
Mark Boger; Tianyuan Liu; Jacqueline Ratliff; William Nick; Xiaohong Yuan; Albert C. Esterline
We used unsupervised machine learning to identify anomalous patterns of network traffic that suggest intrusion. Such techniques allow one to classify network traffic into clusters that emerge from the training data and do not require that signatures already be known. Data is from the National Collegiate Cybersecurity Defense Competition (NCCDC). All but the TCP connections were filtered out, and the features extracted from the remaining data included characteristics of individual connections as well as patterns across time within a sliding window. The learning technique was k-means, with k = 5 giving the most natural and revealing partition of the data. The results bore out the following two hypotheses consistent with the literature: (1) most network traffic is normal, only a certain percentage being malicious; (2) the traffic from an attack is statistically different from normal traffic.
southeastcon | 2017
Dharaben Patel; Xiaohong Yuan; Kaushik Roy; Aakiel Abernathy
Billions of devices are connected together with internet to serve the communication. Network monitoring to detect various security threats has become crucial in any organization. In this paper, we analyze large amount of network traffic data using Hive database in Hadoop Distributed File System (HDFS) environment. Hive queries are developed to identify security threats. The results of queries are demonstrated and the Hive Client application is developed where all the queries can be integrated. An Apache Zeppelin Visualization Tool is also introduced which can provide more insights on the dataset.
frontiers in education conference | 2016
Xiaohong Yuan; Kenneth Williams; D. Scott McCrickard; Charles Hardnett; Litany H. Lineberry; Kelvin S. Bryant; Jinsheng Xu; Albert C. Esterline; Anyi Liu; Selvarajah Mohanarajah; Rachel Rutledge
Due to the popularity of mobile devices, it is important to teach mobile computing and security to students in colleges and universities. This paper describes eight course modules on mobile computing and security we developed that could be integrated into a computer science curriculum. These course modules were presented at a faculty workshop. Workshop evaluation includes a survey questionnaire and reflective narratives from participants. The workshop evaluation results are discussed in this paper. The course modules can be adopted by instructors teaching mobile application development, cyber security or other related courses.
2016 6th International Conference on Information Communication and Management (ICICM) | 2016
Ye Seon Lee; William Hetchily; Joseph Shelton; Dylan Gunn; Kaushik Roy; Albert C. Esterline; Xiaohong Yuan
While mobile devices traditionally use authentication methods such as passwords that define a single point of entry, active authentication can provide greater security by continuously authenticating users while they use the device. By extracting features based on users interaction with the touchscreen, we can distinguish between different users. In this research, we investigate the performances of Deep Belief Networks (DBN) and Random Forest (RF), a more traditional classification algorithm, to classify users using a dataset extracted from the touch patterns of 41 users. The dataset is separated into strokes, which are then grouped into sessions. The preliminary results show that DBNs are outperformed by the RF.
southeastcon | 2018
Sara Althubiti; William Nick; Janelle Mason; Xiaohong Yuan; Albert C. Esterline
southeastcon | 2018
William Leingang; Dylan Gunn; Jung Hee Kim; Xiaohong Yuan; Kaushik Roy
international conference on big data | 2018
Daniel Hooks; Xiaohong Yuan; Kaushik Roy; Albert C. Esterline; Joaquin Hernandez
Archive | 2017
Sara Althubiti; Xiaohong Yuan; Albert C. Esterline
MAICS | 2017
Ningxin Shi; Xiaohong Yuan; William Nick
Collaboration
Dive into the Xiaohong Yuan's collaboration.
North Carolina Agricultural and Technical State University
View shared research outputsNorth Carolina Agricultural and Technical State University
View shared research outputsNorth Carolina Agricultural and Technical State University
View shared research outputsNorth Carolina Agricultural and Technical State University
View shared research outputsNorth Carolina Agricultural and Technical State University
View shared research outputs