Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yibo Xue is active.

Publication


Featured researches published by Yibo Xue.


architectures for networking and communications systems | 2011

SMILER: Towards Practical Online Traffic Classification

Baohua Yang; Guangdong Hou; Lingyun Ruan; Yibo Xue; Jun Li

Network traffic classification is extremely important in numerous network functions today. However, most of the current approaches based on port number or payload detection are becoming increasingly impractical with the appearance of dynamic or encrypted applications. Even though some supervised learning based work were proposed, it is difficult to collect sufficient flow-labeled traces for training. On the other hand, online classification needs an early identification, which is still challenging for most well-known approaches. In this paper, we propose a semi-supervised learning based traffic classification approach named SMILER, which supports an early classification from the sizes of the first few packets (empirically 5 packets) of a flow. Experiments in real networks demonstrate that SMILER achieves 94% precision and 96% recall on average for all tested applications, even with disordered packets SMILER still works well. With a hybrid scheme, the performance is further improved. Meanwhile, SMILER performs fast in both classification and updating. All experimental results show that SMILER is practical for fast and accurate online traffic classification.


international conference on information and communication security | 2007

MDH: a high speed multi-phase dynamic hash string matching algorithm for large-scale pattern set

Zongwei Zhou; Yibo Xue; Junda Liu; Wei Zhang; Jun Li

String matching algorithm is one of the key technologies in numerous network security applications and systems. Nowadays, the increasing network bandwidth and pattern set size both calls for high speed string matching algorithm for large-scale pattern set. This paper proposes a novel algorithm called Multi-phase Dynamic Hash (MDH), which cut down the memory requirement by multi-phase hash and explore valuable pattern set information to speed up searching procedure by dynamic-cut heuristics. The experimental results demonstrate that MDH can improve matching performance by 100% to 300% comparing with other popular algorithms, whereas the memory requirement stays in a comparatively low level.


communications and mobile computing | 2010

UTM-CM: A Practical Control Mechanism Solution for UTM System

Ying Zhang; Fachao Deng; Zhen Chen; Yibo Xue; Chuang Lin

Since emerged in 2004, Unified Threat Management (UTM) has been used widely to enhance network security protection. Typical UTM device integrates multiple security technologies, therefore its control and management involves various interfaces, message formats, communication protocols, and security policies and so on. Therefore, it is a big challenge to design and implement the configuration and management of security technologies in UTM. To address this issue, this paper proposes a practical UTM control mechanism that features ease-to-use, scalability, interoperability, high-efficiency and reliability. The solution, called UTM-Configuration and Management (UTM-CM), has been implemented and its performance was evaluated.


international conference on parallel and distributed systems | 2009

DBS: A Bit-level Heuristic Packet Classification Algorithm for High Speed Network

Baohua Yang; Xiang Wang; Yibo Xue; Jun Li

Packet classification is one of the most critical techniques in many network devices such as Firewall, IDS and IPS, etc. In order to meet the performance requirement for high speed Internet (even higher than 10 Gbps), practical algorithms must keep better spatial and temporal performance. Moreover, as the size of rule set is increasing to tens of thousands, novel packet classification algorithms must have good scalability. In this paper, we propose a novel packet classification algorithm named DBS (Discrete Bit Selection) which takes a bit level heuristic design to partition the rule set effectively. To the best of our knowledge, DBS is the first try to design a heuristic classification algorithm at bit-level. To evaluate the performance of our algorithm, DBS is deployed on a popular multi-core Network Processor platform, compared with two existing well-known algorithms. Experimental results show that DBS achieves 300% higher throughput than HiCuts and HSM, while the memory requirement is reduced to about 10% averagely. DBS works well especially with large rule set (10K), which trends a good scalability.


international conference on parallel and distributed systems | 2009

Towards High-Performance Network Intrusion Prevention System on Multi-core Network Services Processor

Xiang Wang; Yaxuan Qi; Baohua Yang; Yibo Xue; Jun Li

Network intrusion prevention system (NIPS) becomes more complex due to the rapid growth of network bandwidth and requirement of network security. However existing solutions, either hardware-based or software-based cannot obtain a good tradeoff between performance and flexibility. In this paper, we propose a parallel NIPS architecture using emerging network services processor. To resolve the problems and bottlenecks of high-speed processing, we investigate the main design aspects which have dramatic impacts on most parallel network security system implementations: efficient and flexible pipeline and parallel processing, flow-level packet-order preserving, and latency hiding of deep packet inspection. To these key points, we address several optimizations and modifications with an architecture-aware design principle to guarantee high performance and flexibility of the NIPS on a network services processor implementation. Performance evaluation shows that, our prototype NIPS on Cavium OCTEON3860 processor can reach line-rate stateful inspection and multi-Gbps deep inspection performance.


Tsinghua Science & Technology | 2009

Efficiency of cache mechanism for network processors

Bo Xu; Jian Chang; Shimeng Huang; Yibo Xue; Jun Li

Abstract With the explosion of network bandwidth and the ever-changing requirements for diverse network-based applications, the traditional processing architectures, i.e., general purpose processor (GPP) and application specific integrated circuits (ASIC) cannot provide sufficient flexibility and high performance at the same time. Thus, the network processor (NP) has emerged as an alternative to meet these dual demands for todays network processing. The NP combines embedded multi-threaded cores with a rich memory hierarchy that can adapt to different networking circumstances when customized by the application developers. In todays NP architectures, multithreading prevails over cache mechanism, which has achieved great success in GPP to hide memory access latencies. This paper focuses on the efficiency of the cache mechanism in an NP. Theoretical timing models of packet processing are established for evaluating cache efficiency and experiments are performed based on real-life network backbone traces. Testing results show that an improvement of nearly 70% can be gained in throughput with assistance from the cache mechanism. Accordingly, the cache mechanism is still efficient and irreplaceable in network processing, despite the existing of multithreading.


architectures for networking and communications systems | 2008

Towards effective network algorithms on multi-core network processors

Yaxuan Qi; Zongwei Zhou; Baohua Yang; Fei He; Yibo Xue; Jun Li

To build high-performance network devices with holistic security protection, a large number of algorithms have been proposed. However, multi-core implementation of the existing algorithms suffers from three limitations: performance instability, data-structure heterogeneity, and hardware dependency. In this paper, we propose three principles for effective network processing on multi-core network processors. To verify the effectiveness of these principles, algorithms for two typical network processing tasks are redesigned and implemented on the Cavium Octeon3860 network processor. Test results show that our schemes achieve superior performance in comparison with existing best-known algorithms.


international conference on computer communications | 2009

Discrete Bit Selection: Towards a Bit-Level Heuristic Framework for Multi-Dimensional Packet Classification

Baohua Yang; Yaxuan Qi; Fei He; Yibo Xue; Jun Li

Packet classification is still a challenging problem in practice under large number of classification rules and constant growth of performance requirement. Most of the existing algorithms try to solve the problem heuristically by leveraging on the inherent field-level characteristics of the rules. This paper proposes a bit-level heuristic framework: Discrete Bit Selection (DBS) for multi-dimensional packet classification. Preliminary experimental results show that DBS-based algorithm gains much better performance both in search time and memory requirement than the well-known field-level algorithms with various real-life rule sets.


architectures for networking and communications systems | 2009

SANS: a scalable architecture for network intrusion prevention with stateful frontend

Fei He; Yaxuan Qi; Yibo Xue; Jun Li

Inline stateful and deep inspection for intrusion prevention is becoming more challenging due to the increase in both the volume of network traffic and the complexity of the analysis requirements. In this work, we pursue a novel architectural approach, named SANS, which takes both the advantage of new generation network processors for packet-header-based processing and the advantage of commodity x86 platforms for packet payload data processing. A session table scheme is designed for the stateful frontend in SANS to achieve wire speed inline processing.


architectures for networking and communications systems | 2013

PPI: towards precise page identification for encrypted web-browsing traffic

Zhenlong Yuan; Yibo Xue; Wei Xia

Precise Web page identification has always been a research hotspot in the areas of network management and security. However, previous works generally focused on statistical or probabilistic approaches and could not exactly calculate the length of encrypted data under different conditions, which makes them hardly cover all the cases. In this poster, we propose an exact fingerprint derivation method for encrypted Web-browsing traffic and thereby implementing a prototype system for precise page identification (PPI). Our experiments show that PPI not only can be employed for early page identification at individual-flow level but also can achieve very high accuracy at aggregate-traffic level.

Collaboration


Dive into the Yibo Xue's collaboration.

Top Co-Authors

Avatar

Jun Li

Tsinghua University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fei He

Tsinghua University

View shared research outputs
Top Co-Authors

Avatar

Bo Xu

Tsinghua University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xiang Wang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge