Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yue-Bin Luo is active.

Publication


Featured researches published by Yue-Bin Luo.


international conference on advanced communication technology | 2016

Characterizing the running patterns of Moving Target Defense mechanisms

Guilin Cai; Baosheng Wang; Yue-Bin Luo; Sudan Li; Xiaofeng Wang

Moving Target Defense (MTD) has been proposed as a game-changing theme to increase the work effort to attack as well as the security of target system. There has been proposed a multitude of MTD mechanisms. Generally, these mechanisms follow some fundamental running patterns which determine their functionalities. In this paper, we introduce three main schools of thought on MTD mechanisms systematically and categorize the related works according to them. Then we identify and define three fundamental running patterns exhibited by these MTD mechanisms. Thereafter, we use five MTD mechanisms, which belong to the three schools of thought, as cases to confirm the patterns presented. This work can help the novices of this field to understand the running behaviours of MTDs better and easier, and can also give developers design guidance of new MTD system by providing insights of the running patterns.


Journal of Zhejiang University Science C | 2017

A keyed-hashing based self-synchronization mechanism for port address hopping communication

Yue-Bin Luo; Baosheng Wang; Xiaofeng Wang; Bo-Feng Zhang

Port address hopping (PAH) communication is a powerful network moving target defense (MTD) mechanism. It was inspired by frequency hopping in wireless communications. One of the critical and difficult issues with PAH is synchronization. Existing schemes usually provide hops for each session lasting only a few seconds/minutes, making them easily influenced by network events such as transmission delays, traffic jams, packet dropouts, reordering, and retransmission. To address these problems, in this paper we propose a novel self-synchronization scheme, called ‘keyed-hashing based self-synchronization (KHSS)’. The proposed method generates the message authentication code (MAC) based on the hash based MAC (HMAC), which is then further used as the synchronization information for port address encoding and decoding. Providing the PAH communication system with one-packet-one-hopping and invisible message authentication abilities enables both clients and servers to constantly change their identities as well as perform message authentication over unreliable communication mediums without synchronization and authentication information transmissions. Theoretical analysis and simulation and experiment results show that the proposed method is effective in defending against man-in-the-middle (MITM) attacks and network scanning. It significantly outperforms existing schemes in terms of both security and hopping efficiency.


Conference on Advanced Computer Architecture | 2016

A Model for Evaluating and Comparing Moving Target Defense Techniques Based on Generalized Stochastic Petri Net

Guilin Cai; Baosheng Wang; Yue-Bin Luo; Wei Hu

Moving Target Defense has been proposed as a way to alter the asymmetric situation of attacks and defenses, and there has been given a great number of related works. Currently, the performance evaluation of these works has largely been empirical, but lacks the application of theoretical models. Further, the evaluation is usually for a specific approach or a category of MTD approaches, and few work has been taken to compare different MTD techniques. In this paper, we consider a Web server as a deployment scenario for the three typical kinds of MTD techniques, and develop a generalized abstract performance evaluation and comparison model for existing MTDs through using generalized stochastic Petri Net (GSPN). We also take a case study to describe the usage of the model. The model enables us to analyze and understand the benefits and costs of an MTD approach, and can be viewed as an attempt to fill the gap of MTD comparison.


International Conference on Intelligent and Interactive Systems and Applications | 2016

High Performance Low Latency Network Address and Port Hopping Mechanism Based on Netfilter

Yue-Bin Luo; Baosheng Wang; Guilin Cai; Xiaofeng Wang; Bo-Feng Zhang

Network address and port hopping (NPAH) is an effectual moving target defense tactic that comes from frequency hopping in wireless communication, and it is proposed for host and service hiding and attack resistance. In this paper, we propose a high performance low latency network address and port hopping implementation mechanism, using the netfilter framework inside the Linux kernel. We have conducted experiments and tests to evaluate the performance of our method, and the result shows that the proposed mechanism is efficient in implementing NPAH on Linux platform.


international workshop on security | 2014

Effectiveness of Port Hopping as a Moving Target Defense

Yue-Bin Luo; Bao-Sheng Wang; Guilin Cai


Archive | 2015

Analysis of Port Hopping for Proactive Cyber Defense 1

Yue-Bin Luo; Bao-Sheng Wang; Guilin Cai


2015 International Conference on Information and Communications Technologies (ICT 2015) | 2015

TPAH: a universal and multi-platform deployable port and address hopping mechanism

Xiaofeng Wang; Baosheng Wang; Yue-Bin Luo; Guilin Cai; Xiaofeng Hu


trust, security and privacy in computing and communications | 2015

RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries

Yue-Bin Luo; Baosheng Wang; Xiaofeng Wang; Xiaofeng Hu; Guilin Cai; Hao Sun


IEICE Transactions on Information and Systems | 2017

RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks

Yue-Bin Luo; Baosheng Wang; Xiaofeng Wang; Bo-Feng Zhang; Wei Hu


international conference on advanced communication technology | 2018

Grading image retrieval based on CNN deep features

Yue-Bin Luo; Yong Li; Fangjian Han; Shaobing Huang

Collaboration


Dive into the Yue-Bin Luo's collaboration.

Top Co-Authors

Avatar

Baosheng Wang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Guilin Cai

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Xiaofeng Wang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Bo-Feng Zhang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Wei Hu

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Xiaofeng Hu

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Bao-Sheng Wang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Fangjian Han

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Hao Sun

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Shaobing Huang

National University of Defense Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge