Cyber Modeling & Simulation
Goal: use large-scale modeling & simulation techniques to analyze emerging cyber threats such as worms and botnets
Publications:
+ Game-theoretic analysis of DDoS attacks and defense
* Guanhua Yan, Ritchie Lee, Alex Kent, David Wolpert, Towards a Bayesian Network Game Framework for Evaluating DDoS Attacks and Defense, Proceedings of the 19th ACM Computer and Communications Security Conference (CCS'12), October 2012. (Accepted)
* Guanhua Yan, Stephan Eidenbenz, DDoS Mitigation in Non-Cooperative Environments, Proceedings of IFIP Networking 2008, May 2008.
+ Peer-to-peer botnets
* Guanhua Yan, Songqing Chen, Stephan Eidenbenz, RatBot: Anti-Enumeration Peer-to-Peer Botnets, Proceedings of the 14th Information Security Conference (ISC'11), October 2011.
* Guanhua Yan, Duc T. Ha, Stephan Eidenbenz, AntBot: Anti-Pollution Peer-to-Peer Botnet, Elsevier Computer Networks 55(8), June 2011.
* Yuanyuan Zeng, Guanhua Yan, Stephan Eidenbenz, Kang G. Shin, Measuring the Effectiveness of Infrastructure-Level Detection of Large-Scale Botnets, Proceedings of 19th ACM/IEEE International Workshop on Quality of Service (IWQoS'11), June 2011.
* Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q. Ngo, On the Effectiveness of Structural Detection and Defense against P2P-based Botnets, Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), June 2009.
+ Malware propagation in online social networks
* Nam P. Nguyen, Guanhua Yan, My T. Thai, Stephan Eidenbenz, Containment of Misinformation Spread in Online Social Networks, Proceedings of the 4th ACM Web Science (WebSci'12), June 2012.
* Guanhua Yan, Guanling Chen, Stephan Eidenbenz, Nan Li, Malware Propagation in Online Social Networks: Nature, Dynamics, and Defense Implications, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS'11), March 2011.
* Nandakishore Santhi, Guanhua Yan, Stephan Eidenbenz, CyberSim: Geographic, Temporal, and Organizational Dynamics of Malware Propagation, Proceedings of the 2010 Winter Simulation Conference (WSC'10), December 2010.
+ Bluetooth worms
* Guanhua Yan, Leticia Cuellar, Stephan Eidenbenz, Nicolas Hengartner, Blue-Watchdog: Detecting Bluetooth Worm Propagation in Public Areas, Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), June 2009.
* Guanhua Yan, Stephan Eidenbenz, Modeling Propagation Dynamics of Bluetooth Worms (Extended Version), IEEE Transactions on Mobile Computing, March 2009.
* Guanhua Yan, Stephan Eidenbenz, Modeling Propagation Dynamics of Bluetooth Worms, Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS'07), June 2007.
* Guanhua Yan, Leticia Cuellar, Stephan Eidenbenz, Hector D. Flores, Nicolas Hengartner, Vincent Vu, Bluetooth worm propagation: mobility pattern matters!, Proceedings of the 2nd ACM symposium on Information, computer and communications security (ASIACCS'07), March 2007.
* Guanhua Yan, Stephan Eidenbenz, Bluetooth Worms: Models, Dynamics, and Defense Implications, Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference (ACSAC'06), December 2006.
+ Malware propagation in sensor networks
* Bo Sun, Guanhua Yan, Yang Xiao, T. Andrew Yang, Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications, Ad Hoc Networks, Vol. 7 No. 8, Privacy and Security in Wireless Sensor and Ad Hoc Networks, November 2009.
* Bo Sun, Dibesh Shrestha, Guanhua Yan, Yang Xiao, Self-propagate Mal-packets in Wireless Sensor Networks: Dynamics and Defense Implications, Proceedings of IEEE Global Communications Conference (Globecom'08), December 2008.
* Bo Sun, Guanhua Yan, Yang Xiao, Worm Propagation Dynamics in Wireless Sensor Networks, Proceedings of IEEE International Conference on Communications (ICC'08), May 2008.
+ Cyber security exercise testbed
* Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier, RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version), Simulation: Transactions of the Society for Modeling and Simulation International, 82(1), January 2006.
* Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier, RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises, Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation (PADS'05), June 2005.
Goal: use large-scale modeling & simulation techniques to analyze emerging cyber threats such as worms and botnets
Publications:
+ Game-theoretic analysis of DDoS attacks and defense
* Guanhua Yan, Ritchie Lee, Alex Kent, David Wolpert, Towards a Bayesian Network Game Framework for Evaluating DDoS Attacks and Defense, Proceedings of the 19th ACM Computer and Communications Security Conference (CCS'12), October 2012. (Accepted)
* Guanhua Yan, Stephan Eidenbenz, DDoS Mitigation in Non-Cooperative Environments, Proceedings of IFIP Networking 2008, May 2008.
+ Peer-to-peer botnets
* Guanhua Yan, Songqing Chen, Stephan Eidenbenz, RatBot: Anti-Enumeration Peer-to-Peer Botnets, Proceedings of the 14th Information Security Conference (ISC'11), October 2011.
* Guanhua Yan, Duc T. Ha, Stephan Eidenbenz, AntBot: Anti-Pollution Peer-to-Peer Botnet, Elsevier Computer Networks 55(8), June 2011.
* Yuanyuan Zeng, Guanhua Yan, Stephan Eidenbenz, Kang G. Shin, Measuring the Effectiveness of Infrastructure-Level Detection of Large-Scale Botnets, Proceedings of 19th ACM/IEEE International Workshop on Quality of Service (IWQoS'11), June 2011.
* Duc T. Ha, Guanhua Yan, Stephan Eidenbenz, Hung Q. Ngo, On the Effectiveness of Structural Detection and Defense against P2P-based Botnets, Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), June 2009.
+ Malware propagation in online social networks
* Nam P. Nguyen, Guanhua Yan, My T. Thai, Stephan Eidenbenz, Containment of Misinformation Spread in Online Social Networks, Proceedings of the 4th ACM Web Science (WebSci'12), June 2012.
* Guanhua Yan, Guanling Chen, Stephan Eidenbenz, Nan Li, Malware Propagation in Online Social Networks: Nature, Dynamics, and Defense Implications, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS'11), March 2011.
* Nandakishore Santhi, Guanhua Yan, Stephan Eidenbenz, CyberSim: Geographic, Temporal, and Organizational Dynamics of Malware Propagation, Proceedings of the 2010 Winter Simulation Conference (WSC'10), December 2010.
+ Bluetooth worms
* Guanhua Yan, Leticia Cuellar, Stephan Eidenbenz, Nicolas Hengartner, Blue-Watchdog: Detecting Bluetooth Worm Propagation in Public Areas, Proceedings of the 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'09), June 2009.
* Guanhua Yan, Stephan Eidenbenz, Modeling Propagation Dynamics of Bluetooth Worms (Extended Version), IEEE Transactions on Mobile Computing, March 2009.
* Guanhua Yan, Stephan Eidenbenz, Modeling Propagation Dynamics of Bluetooth Worms, Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS'07), June 2007.
* Guanhua Yan, Leticia Cuellar, Stephan Eidenbenz, Hector D. Flores, Nicolas Hengartner, Vincent Vu, Bluetooth worm propagation: mobility pattern matters!, Proceedings of the 2nd ACM symposium on Information, computer and communications security (ASIACCS'07), March 2007.
* Guanhua Yan, Stephan Eidenbenz, Bluetooth Worms: Models, Dynamics, and Defense Implications, Proceedings of the 22nd Annual Computer Security Applications Conference on Annual Computer Security Applications Conference (ACSAC'06), December 2006.
+ Malware propagation in sensor networks
* Bo Sun, Guanhua Yan, Yang Xiao, T. Andrew Yang, Self-propagating mal-packets in wireless sensor networks: Dynamics and defense implications, Ad Hoc Networks, Vol. 7 No. 8, Privacy and Security in Wireless Sensor and Ad Hoc Networks, November 2009.
* Bo Sun, Dibesh Shrestha, Guanhua Yan, Yang Xiao, Self-propagate Mal-packets in Wireless Sensor Networks: Dynamics and Defense Implications, Proceedings of IEEE Global Communications Conference (Globecom'08), December 2008.
* Bo Sun, Guanhua Yan, Yang Xiao, Worm Propagation Dynamics in Wireless Sensor Networks, Proceedings of IEEE International Conference on Communications (ICC'08), May 2008.
+ Cyber security exercise testbed
* Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier, RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version), Simulation: Transactions of the Society for Modeling and Simulation International, 82(1), January 2006.
* Michael Liljenstam, Jason Liu, David M. Nicol, Yougu Yuan, Guanhua Yan, Chris Grier, RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises, Proceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation (PADS'05), June 2005.