Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zongfen Han is active.

Publication


Featured researches published by Zongfen Han.


international workshop on variable structure systems | 2004

A fuzzy data mining based intrusion detection model

Hai Jin; Jianhua Sun; Hao Chen; Zongfen Han

With explosively increasing information, data mining techniques are frequently employed to identify trends in the warehouse that may not be readily apparent. In this paper we apply fuzzy data mining techniques to a security system and build a fuzzy data mining based intrusion detection model. Through normalizing the data set and building a fuzzy similar matrix of the network connections in the data set, network connections are clustered into different classes.


international conference on networking | 2005

Network-Based anomaly detection using an elman network

En Cheng; Hai Jin; Zongfen Han; Jianhua Sun

An intrusion detection model based on Elman network is proposed to detect anomalies in network traffic. The model applies an Elman network for anomaly detection in order to provide the detector with an internal memory and therefore necessary dynamic characteristics. Unlike the existing applications of Artificial Neural Networks to detect intrusion that extract a set of attributes from only the packet headers but discard the packet payload, the present model adopts the concept of clustering the payload to alleviate information loss by retaining part of the information related to the packet payload. The model has been applied to DARPA IDS Evaluation dataset and the results demonstrate that with the two unique features, the model can identify not only intra-packet anomalies, but also inter-packet sequence anomalies.


international conference on internet computing for science and engineering | 2008

An Authenticated Encryption Mechanism for Secure Group Communication in Grid

Yunfa Li; Hai Jin; Deqing Zou; Sanmin Liu; Zongfen Han

In grid computing, group communication is an important strategy to realize large-scale information resource sharing. However, it is very difficult to ensure the security of group communication in large-scale grid environment. In this paper, based on the basic theories of threshold signature and the basic characteristics of group communication in grid, we present four algorithms, including keys generating, individual signature generating and verifying, group signature generating and encrypting, decrypting and group signature verifying, which constitute the authenticated encryption mechanism for group communication in grid. Finally, we validate the correctness of the authenticated encryption mechanism proposed in this paper and analyze its security. In addition, the validity of this mechanism is verified by the experiments. The results show that it is efficient to ensure the security of group communication in grid.


computer software and applications conference | 2007

A Scalable Service Scheme for Secure Group Communication in Grid

Yunfa Li; Hai Jin; Deqing Zou; Jieyun Chen; Zongfen Han

In this paper, we propose a scalable service scheme for secure group communication in grid. In the service scheme, a series of methods and strategies are presented, such as the initialization methods for group member, administrative domain and virtual organization, the key distribution strategy and the rekeying strategy. In order to improve the scalability of this service scheme, the services for a group are logically divided into two hierarchical levels, which is in accordance with the characteristics of group communication in grid. In addition, in order to show the efficiency and the scalability of the service scheme, simulation experiments are done. The results show that the service scheme is efficient and scalable. Thus, the service scheme can satisfy the requirement of people in large-scale, dynamic grid environment.


international conference on move to meaningful internet systems | 2006

Header metadata extraction from semi-structured documents using template matching

Zewu Huang; Hai Jin; Pingpeng Yuan; Zongfen Han

With the recent proliferation of documents, automatic metadata extraction from document becomes an important task In this paper, we propose a novel template matching based method for header metadata extraction form semi-structured documents stored in PDF In our approach, templates are defined, and the document is considered as strings with format Templates are used to guide finite state automaton (FSA) to extract header metadata of papers The testing results indicate that our approach can effectively extract metadata, without any training cost and available to some special situation This approach can effectively assist the automatic index creation in lots of fields such as digital libraries, information retrieval, and data mining.


web intelligence | 2005

A Virtual-Service-Domain Based Bidding Algorithm for Resource Discovery in Computational Grid

Hongbo Zou; Hai Jin; Zongfen Han; Jing Tie; Xuanhua Shi

Resource discovery is a basic service in grid computing: gives a description of resources desired and finds the available one to match the description. In computational grid, how to discover resources efficiently has become a crucial factor to evaluate the performance in the whole system. In this paper, we present a bid-based resource discovery algorithm, which converts a resource request into a bidding letter and sends it to a group of physical services owned by the same virtual service to call for bidding. All resources receiving bidding letter make offers to bid according to our algorithm. Job manager selects the best one to response client request. To evaluate the performance of our method, we compare our system with the centralized and peer-to-peer resource discovery approaches. The analysis results show that our system reduces average response time of jobs, leverages the cost of the resource discovery, and improves the system scalability.


high performance computing and communications | 2005

A community-based trust model for P2P networks

Hai Jin; Xuping Tu; Zongfen Han; Xiaofei Liao

Trust management is a key issue for P2P networks. Previous works build peer’s reputation just based on ratings of other individual peers. In this paper we present a novel trust construction approach, called CommunityTrust. The approach evaluates peers’ reputation taking other peers’ ratings into account as well as recommendations of some related communities and peers. Our preliminary simulation results show that CommunityTrust model significantly improves the trust computation accuracy of P2P e-Commerce systems.


ubiquitous computing | 2009

A secure mechanism of group communication for pervasive grid

Yunfa Li; Hai Jin; Zongfen Han; Sanmin Liu

Cooperative processing is a representative application in pervasive grid and group communication is the key technique in this application. It is a great challenge to ensure the security of group communication in pervasive grid. In this paper, we first describe the service infrastructure of middleware for pervasive grid. Then, we present a secure mechanism of group communication and analyse the correctness and the security of the mechanism. Finally, we verify the validity of this mechanism by experiments. Results show that our proposed mechanism is efficient to ensure the security of group communication in pervasive grid.


international conference on e-business engineering | 2005

HRTC: hybrid resource information service architecture based on GMA

Hongbo Zou; Hai Jin; Zongfen Han; Xuanhua Shi; Hanhua Chen

Resource information service, as a key component of grid, is the basis of the resource allocation, resource performance evaluation and prediction. The validity of the resource information service directly influences the availability of the whole system. One of key points to make information service work well is the precise of the information collected, how to get the valid system information with low system cost has became a difficult problem in current information service. In this paper, we propose hybrid resource information service architecture based on grid monitoring architecture to promote the validity of the resource information service in grid. HRIC is an improved information service architecture that utilizes resource changing self-monitoring mechanism to offset the blind spot of the periodical information collection and combine the advantages of two traditional information collection methods - periodic collection and stochastic reporting, thereby improving the accuracy of resource information service. Compared with the existing resource information systems, HRICs performance has been validated by several applications


ieee international conference on services computing | 2005

ALTER: adaptive failure detection services for grids

Xuanhua Shi; Hai Jin; Zongfen Han; Weizhong Qiang; Song Wu; Deqing Zou

This paper presents an adaptive failure detection service (ALTER), which incorporates the technique of unreliable failure detection service and the idea of R-GMA. ALTER is organized in a hierarchical structure. It can be adaptive to the system conditions and user requirements with changing the system parameters and system organizations. With experimental evaluation, ALTER shows good scalability and flexibility.

Collaboration


Dive into the Zongfen Han's collaboration.

Top Co-Authors

Avatar

Hai Jin

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Deqing Zou

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jianhua Sun

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yunfa Li

Hangzhou Dianzi University

View shared research outputs
Top Co-Authors

Avatar

Hao Chen

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Weizhong Qiang

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Xiaofei Liao

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Xueguang Chen

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Jieyun Chen

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Xuanhua Shi

Huazhong University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge