Shanqing Guo

Learn More
Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts arbitrary number of replicas into the network. Consequently, the adversary can carry out many internal attacks. Previous solutions on detecting clone attacks have several(More)
An identity-based broadcast encryption cryptosystem enable senders to efficiently broadcast cipher texts to a large set of receivers, which can use arbitrary strings as public keys. In this kind of cryptosystem, if the Private Key Generator (PKG) is untrusted, you may suddenly learn that a private key corresponding to your Identity is used to decrypt some(More)
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on(More)
Clustering has been widely used in wireless ad hoc networks for various purposes such as routing, broadcasting and Qos. Many clustering algorithms have been proposed. However, most of them implicitly assume that nodes behave honestly in the clustering process. In practice, there might be some malicious nodes trying to manipulate the clustering process to(More)
Recently, A new generation of network applications, such as P2P, has started to consume a large amount of network resources, thus produce several problems to network operators, which make the identification of network applications become a new and difficult challenge for both network operators and the network measurement community. Traditional(More)
Accurate network traffic classification is fundamental to numerous network activities, from Quality of Service to providing operators with useful forecasts for long-term provisioning. In this paper, we apply the discretization method in Naive Bayes for internet traffic identification and compare the result with that of previously applied Naive Bayes kernel(More)
1 Supported by National Natural Science Foundation of China (60873232), Science and Technology Program of Shandong Province (2007GG10001012), and Youth Science Funds of Shandong Province(Q2008G01) Abstract-Wireless sensor networks are employed in a wide range of applications, and its important position is promoted rapidly. Secure data aggregation is one of(More)
Global darknet monitoring provides an effective way to observe cyber-attacks that are significantly threatening network security and management. In this paper, we present a study on characterization of cyberattacks in the big stream data collected in a large scale distributed darknet using association rule learning. The experiment shows that association(More)
Characterization of Peer-to-Peer (P2P) traffic is an essential step to develop workload models towards capacity planning and cyber-threat countermeasure over P2P networks. In this paper, we present a new scheme for characterizing P2P file sharing hosts based on transport layer statistical features. The proposed scheme is featured by its tunability over(More)