zhen chen
We design a family of bitmap indexes coding schemes to improve the query performance and reduce the indices size for Big Data store. We also propose bitmap index coding scheme to adapt 64 bit architecture and beyond. Bitmap indexing techniques are useful in Internet traffic forensic, log analysis, finance transactions, bioinformatic, Machine Learning etc.
Now, we are working on Internet traffic analysis based on Cloud computing and Big Data Analysis.
Formerly, we design pattern matching algorithm HBM(Hash-Boyer-Moore algorithm) and ACST(Aho-Corasick Suffix Tree) to fast identify the potential attacks.
Supervisors: Zengji Liu and Chuang Lin
Address: FIT building Room 4-308
Now, we are working on Internet traffic analysis based on Cloud computing and Big Data Analysis.
Formerly, we design pattern matching algorithm HBM(Hash-Boyer-Moore algorithm) and ACST(Aho-Corasick Suffix Tree) to fast identify the potential attacks.
Supervisors: Zengji Liu and Chuang Lin
Address: FIT building Room 4-308
less
InterestsView All (11)
Uploads
Papers by zhen chen
centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network, enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this
paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used in a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet inspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for intelligence flow processing to protect from possible network attacks inside a data center network.
centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network, enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this
paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used in a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet inspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for intelligence flow processing to protect from possible network attacks inside a data center network.