Anomaly Detection
Goal: develop effective, yet efficient, techniques to detect anomalous activities in large-scale communication networks and cyber space
Publications:
* Guanhua Yan, Peri-Watchdog: Hunting for Hidden Botnets in the Periphery of Online Social Networks, Elsevier Computer Networks, Special Edition on Botnet Activity: Analysis, Detection and Shutdown. (Accepted)
* Konstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, Srikanth Krishnamurthy, Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks, IEEE Transactions on Mobile Computing 11(7), July 2012.
* Chrisil Arackaparambil, Guanhua Yan, Sergey Bratus, Alper Caglayan, On Tuning the Knobs of Distribution-based Methods for Detecting VoIP Covert Channels, Proceedings of Hawaii International Conference on System Sciences (HICSS-45), January 2012.
* Chrisil Arackaparambil, Guanhua Yan, Wiki-watchdog: Anomaly Detection in Wikipedia Through a Distributional Lens, Proceedings of IEEE/WIC/ACM Web Intelligence (WI'11), August 2011.
* Guanhua Yan, Stephan Eidenbenz, Emanuele Galli, SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID'09), September, 2009.
* Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen, VirusMeter: Preventing Your Cellphone from Spies, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID'09), September, 2009.
* Guanhua Yan, Leticia Cuellar, Stephan Eidenbenz, Nicolas Hengartner, Blue-Watchdog: Detecting Bluetooth Worm Propagation in Public Areas, Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), June 2009.
* Konstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, Srikanth Krishnamurthy, Detecting Selfish Exploitation of Carrier Sensing in 802.11 WLANs, Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM'09), April 2009.
* Guanhua Yan, Stephan Eidenbenz, Bo Sun, Mobi-Watchodog: You Can Steal, But You Can't Run!, Proceedings of the Second ACM Conference on Wireless Network Security (WiSec'09), March 2009.
* Lei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang, BotTracer: Execution-Based Bot-Like Malware Detection, Proceedings of the 11th international conference on Information Security (ISC'08), September 2008.
* Guanhua Yan, Zhen Xiao, Stephan Eidenbenz, Catching instant messaging worms with change-point detection techniques, Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET'08), April 2008.
Goal: develop effective, yet efficient, techniques to detect anomalous activities in large-scale communication networks and cyber space
Publications:
* Guanhua Yan, Peri-Watchdog: Hunting for Hidden Botnets in the Periphery of Online Social Networks, Elsevier Computer Networks, Special Edition on Botnet Activity: Analysis, Detection and Shutdown. (Accepted)
* Konstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, Srikanth Krishnamurthy, Detection of Selfish Manipulation of Carrier Sensing in 802.11 Networks, IEEE Transactions on Mobile Computing 11(7), July 2012.
* Chrisil Arackaparambil, Guanhua Yan, Sergey Bratus, Alper Caglayan, On Tuning the Knobs of Distribution-based Methods for Detecting VoIP Covert Channels, Proceedings of Hawaii International Conference on System Sciences (HICSS-45), January 2012.
* Chrisil Arackaparambil, Guanhua Yan, Wiki-watchdog: Anomaly Detection in Wikipedia Through a Distributional Lens, Proceedings of IEEE/WIC/ACM Web Intelligence (WI'11), August 2011.
* Guanhua Yan, Stephan Eidenbenz, Emanuele Galli, SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID'09), September, 2009.
* Lei Liu, Guanhua Yan, Xinwen Zhang, Songqing Chen, VirusMeter: Preventing Your Cellphone from Spies, Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID'09), September, 2009.
* Guanhua Yan, Leticia Cuellar, Stephan Eidenbenz, Nicolas Hengartner, Blue-Watchdog: Detecting Bluetooth Worm Propagation in Public Areas, Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), June 2009.
* Konstantinos Pelechrinis, Guanhua Yan, Stephan Eidenbenz, Srikanth Krishnamurthy, Detecting Selfish Exploitation of Carrier Sensing in 802.11 WLANs, Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM'09), April 2009.
* Guanhua Yan, Stephan Eidenbenz, Bo Sun, Mobi-Watchodog: You Can Steal, But You Can't Run!, Proceedings of the Second ACM Conference on Wireless Network Security (WiSec'09), March 2009.
* Lei Liu, Songqing Chen, Guanhua Yan, Zhao Zhang, BotTracer: Execution-Based Bot-Like Malware Detection, Proceedings of the 11th international conference on Information Security (ISC'08), September 2008.
* Guanhua Yan, Zhen Xiao, Stephan Eidenbenz, Catching instant messaging worms with change-point detection techniques, Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (LEET'08), April 2008.