Duohe Ma

Duohe Ma

  • Position:Associate Researcher/associate professor/CISSP
  • Work:Institute of Information Engineering,CAS
  • Address:E-park C1, No. 65 Xingshikou Road, Haidian District, Beijing
  • Email:maduohe[A T]iie.ac.cn
  • Email  /  UCAS  /  SCHOLAT

    Research

  • Moving Target Defense
  • Moving target defense is a theory and method to transform the defense defects of existing information systems based on dynamic, randomized and diversified ideas. Its core idea is to build a dynamic, heterogeneous and uncertain cyberspace target environment to increase the attack difficulty of attackers and resist network attacks.

  • Cyber Deception
  • Cyber deception constructs the scientific cornerstone of deception defense.The goal of repudiation and deception is to influence the attacker's behavior, make it attack in the direction conducive to the defense, and build a causal relationship that has a psychological impact on the attacker due to the attack and defense behavior.

  • Intelligent Security
  • As a strategic and transformative information technology, artificial intelligence adds new uncertainty to Cyberspace Security. Artificial intelligence cyberspace security risks include network security risk, data security risk, algorithm security risk and information security risk.

  • Data Security Privacy Protection
  • The problem of privacy disclosure caused by data analysis is becoming more and more serious, and protecting private data and preventing the disclosure of sensitive information has become a new challenge. Common technologies include homomorphic encryption, differential privacy, data desensitization, privacy computing and so on.

    Project

    (1) Scale test and verification of software definition network (SDN) for multi service integration, participation, national level, 2015-05-2018-06
    (2) Key technologies and equipment of high-performance cloud computing data center, participation, national level, October 2017 to October 2021
    (3) Information application security cloud service, participation, ministerial level, 2017-01-2021-12

    Work

  • The Fifth Research Office, Institute of information engineering, Chinese Academy of Sciences

  • Professional Affiliation

  • Visiting researcher, Institute of information countermeasure technology, School of computer science, Harbin University of Technology
  • Visiting researcher, Institute of financial information security, School of information, Central University of Finance and Economics
  • Publication

    Papers:

    1. Quantitative Security Assessment Method based on Entropy for Moving Target Defense
      In ACM Symposium on Information, Computer and Communications Security(ASIACCS). ACM,, 2017, Primary author
      paper| link

    2. Optimal Strategy Selection for Moving Target Defense Based on Markov Game
      IEEE Access, 2017, Second author
      paper| link

    3. Performance Assessment Approach Based on Change-point Detection for Network Moving Target Defense
      Journal on Communications, 2017, Second author
      paper| link

    4. Network Moving Target Defense Technique Based on Optimal Forwarding Path Migration
      Journal on Communications, 2017, Second author
      paper| link

    5. A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks
      18th International Conference on Information and Communications Security (ICICS2016), 2016, Primary author
      paper| link

    6. Thwart Eavesdropping Attacks on Network Communication Based on Moving Target Defense
      Performance Computing and Communications Conference (IPCCC), 2016 IEEE 35th International, 2016, Primary author
      paper| link

    7. Moving Target Network Defense Effectiveness Evaluation Based on Change-point Detection
      MPE, 2016, Second author
      paper| link

    8. A Moving Target Defense Approach Based on POF to Thwart Blind DDoS Attack
      International Conference on Computer Communications & Networks. IEEE, 2015, Primary author

    9. Defending Blind DDoS Attack on SDN Based on Moving Target Defense
      International Conference on Security and Privacy in Communication Networks. Springer International Publishing, 2014, Primary author
      paper| link

    10. WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense
      IEEE International Conference on Web Services (ICWS), 2020, Second author
      paper| link

    11. What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense
      IEEE International Performance Computing and Communications Conference (IPCCC), 2020, Second author
      paper| link

    Book:

    1. Cyberspace Deception: the Scientific Cornerstone of Constructing Deception Defense
      Cyber Degradation, Huazhang Machinery Industry Press, August 2017, Primary author

    2. Data Breaches(Chinese)

    Award

    Reward Information:

  • Beijing Science and technology progress first prize, first prize, provincial, 2012

    Patent Achievements:

  • A dynamic application address translation method and its gateway system, invention, 2014, the first author, patent No.: zl201410599147.7

  • An SDN controlled blind DDoS attack defense method and system, invention, 2013, the first author, patent No.: zl201310516638.6

  • A web backdoor detection method and system based on Association tree, invention, 2013, the first author, patent No.: zl201310517193.3

  • A cross platform detection method and system for malicious files in cloud environment, invention, 2013, the first author, patent No.: zl201310517192.9

  • Leave your comment here...






    Welcome to this website✩