Zonghua Zhang

Learn More
Wireless body area network (WBAN) has been recognized as one of the promising wireless sensor technologies for improving healthcare service, thanks to its capability of seamlessly and continuously exchanging medical information in real time. However, the lack of a clear in-depth defense line in such a new networking paradigm would make its potential users(More)
In mobile ad hoc networks (MANETs), nodes usually cooperate and forward each other's packets in order to enable out of range communication. However, in hostile environments, some nodes may deny to do so, either for saving their own resources or for intentionally disrupting regular communications. This type of misbehavior is generally referred to as packet(More)
The increasing complexity of today’s computer systems, together with the rapid emergence of novel vulnerabilities, make security hardening a formidable challenge for security administrators. Although a large variety of tools and techniques are available for vulnerability analysis, the majority work at system or network level without explicit association(More)
Intrusion detection system (IDS) plays a vital role in defending our cyberspace against attacks. Either misuse-based IDS or anomaly-based IDS, or their combinations, however, can only partially reflect the true system state due to excessive false alerts, low detection rate, and inaccurate incident diagnosis. An automated response component built upon IDS(More)
As one of the backup measures of intrusion prevention techniques, intrusion detection system (IDS) plays a paramount role in the second defense line of computer networks. Due to the special infrastructure and communication mode, intrusion detection in wireless mesh networks (WMNs) is especially challenging and requires particular design considerations. In(More)
Wireless body area network (WBAN) is one of the most promising wireless sensor technologies, significantly enhancing the quality of service of healthcare. But the potential users' worries about privacy leakage impede its wider application. To alleviate such worries, we present a remote anonymous authentication protocol to enable client terminals/application(More)
Distributed Denial of Service attacks (DDoS) have remained as one of the most destructive attacks in the Internet for over two decades. Despite tremendous efforts on the design of DDoS defense strategies, few of them have been considered for widespread deployment due to strong design assumptions on the Internet infrastructure, prohibitive operational costs(More)
To break the strong assumption that most of the training data for intrusion detectors are readily available with high quality, conventional SVM, robust SVM and one-class SVM are modified respectively in virtue of the idea from online support vector machine (OSVM) in this paper, and their performances are compared with that of the original algorithms.(More)