Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhongwen Li is active.

Publication


Featured researches published by Zhongwen Li.


international multi conference on computing in global information technology | 2006

An Analytical Model for DDoS Attacks and Defense

Yang Xiang; Wanlei Zhou; Zhongwen Li

Distributed denial of service (DDoS) attack has been identified as one of the most serious problems on the Internet. While much of the current research focus on DDoS countermeasures, little attention has been paid on DDoS modeling, which is one of the important aspects that can help provide better solutions against DDoS attacks. This paper proposes an analytical model for the interactions between DDoS attack party and defense party, which allows us to have a deep insight of the interactions between the attack and defense parties. Many refinements of the basic analytical model such as reinforcement of the defense party and loss in defense party are given in the paper, which suit for many real DDoS scenarios. Moreover, the applications of this model demonstrate that the model can precisely estimate the effectiveness of a DDoS defense system before it encounters different attacks and quantitatively estimate the optimal level of investment on DDoS defense system. Additionally, it can also be applied to model some other network security problems such as virus and spam defense


network and parallel computing | 2007

On the Effectiveness of Flexible Deterministic Packet Marking for DDoS Defense

Yang Xiang; Wanlei Zhou; Zhongwen Li; Qun Zeng

IP traceback is one of the defense mechanisms for distributed denial of service (DDoS) attacks. However, most traceback schemes consume extensive resources such as CPU, memory, disk storage and bandwidth and require a large amount of IP packets to reconstruct sources, which makes them impractical and ineffective. In this paper, we present a new flexible IP traceback scheme called flexible deterministic packet marking (FDPM). The flexibilities of FDPM are in two ways, one is that it can adjust the length of marking field according to the network protocols deployed, thus it can work well even in an environment with different network protocols; the other is that it can adjust the marking rate according to the load of participating router, while it still can maintain the marking function. In order to verify the effectiveness of FDPM for DDoS defense in terms of marking efficiency, maximum forwarding rate, and number of packets for reconstruction, we tested FDPM by both simulation and Linux router implementation with an emphasis on the latter. The experiments demonstrate that the built-in overload prevention mechanism, flow-based marking, can isolate and mark the most possible DDoS attack packets, while keeping the load of the participating router in a reasonably low degree. The real hardware implementation confirms that this flexible capability is important when traceback mechanisms are used in a real DDoS defense scenario.


grid and cooperative computing | 2006

Optimizing Adaptive Checkpointing Schemes for Grid Workflow Systems

Yang Xiang; Zhongwen Li; Hong Chen

One of the major challenges in wide use of grid workflow systems is fault tolerance and avoidance. Checkpointing schemes provide a way of fault detection and recovery. In our research, we focus on performance optimization of checkpointing schemes for grid workflow systems. We propose a set of adaptive checkpointing schemes that dynamically adjust the checkpointing intervals online by using store-checkpoints (SCPs) and compare-checkpoints (CCPs). These schemes can efficiently utilize comparison and storage operations and significantly improve the performance. Further, these schemes can calculate the optimal numbers of checkpoints by which minimize the mean execution time. We also expand the schemes from single-task execution scenarios to multitask execution scenarios. Simulation results show these schemes outstandingly increase the likelihood of timely task completion when faults occur


network and parallel computing | 2007

A Cross-Authentication Model for Heterogeneous Domains in Active Networks

Qiong Chen; Zhongwen Li; Shui Yu

Active network has been applied widely recently. The current status is that there is coexistence of multi-PKI in heterogeneous domains. We have noticed there are little work has been done in cross-certification for heterogeneous domains. In this paper, we propose a cross-authentication model for the raised issue. Our system implements mutual entity authentication among heterogeneous domains based on Cert-PKI and ID-PKI. The theoretical analysis and the preliminary experiments demonstrate that the proposed system possesses the properties of high security and stability.


computational intelligence and security | 2007

Simulation and Analysis of DDoS in Active Defense Environment

Zhongwen Li; Yang Xiang; Dongsheng He

Currently there is very few data that can describe the whole profile of a DDoS attack. In this paper, the active DDoS defense system deploys a number of sub-systems, such as Flexible Deterministic Packet Marking (FDPM) and Mark-Aided Distributed Filtering (MADF). In addition, two DDoS tools, TFN2K and Trinoo, are adopted and integrated into SSFNet to create virtual DDoS networks to simulate the attacks. Then, simulation experiments are used to evaluate the performance of the active DDoS defense system. At last, we set up a model to describe the interactions between DDoS attack and defense party, which allows us to have a deep insight of the interactions between the attack and defense parties. Experiment results shows that the model can precisely estimate the defense effectiveness of the system when it encounters attacks.


computational intelligence and security | 2006

Mathematical Analysis of Active DDoS Defense Systems

Zhongwen Li; Yang Xiang

Based on the idea of active DDoS defense system, we discuss designing aims and characteristics of DDoS analytical model. Then we set up a model to describe the combat between attackers and defenders, which quantitatively give the strengths and the relationships. At last, experiments have proved the validity of the proposed model. We can extend this basic analytical model to estimate the effectiveness of a DDoS defense system before it encounters different


international multi symposiums on computer and computational sciences | 2006

Performance Optimization of Checkpointing Schemes with Task Duplication

Zhongwen Li; Yang Xiang; Hong Chen

Using store-checkpoints (SCPs) and compare-checkpoints (CCPs), we present an adaptive checkpointing scheme that dynamically adjusts the checkpointing interval on line in this paper. With additional SCPs and CCPs, we can use both the comparison and storage operations in an efficient way and improve the performance of checkpointing schemes. Further, we obtain methods to calculate the optimal numbers of checkpoints by which minimize the mean execution times. Simulation results show that compared to previous methods, the proposed approach significantly increases the likelihood of timely task completion in the present of faults


network and parallel computing | 2008

Spam Mail Filtering Based on Network Processor

Lian Lin; Zhongwen Li; Liang Shi


Concurrency and Computation: Practice and Experience | 2008

Checkpointing schemes for Grid workflow systems

Zhongwen Li; Yang Xiang


Computer Systems: Science & Engineering | 2008

A cross-authentication model and implementation

Zhongwen Li; Qiong Chen; Yang Xiang

Collaboration


Dive into the Zhongwen Li's collaboration.

Top Co-Authors

Avatar

Yang Xiang

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dongsheng He

Southwest Petroleum University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge