Duohe Ma
Position:Associate Researcher/associate professor/CISSP
Work:Institute of Information Engineering,CAS
Address:E-park C1, No. 65 Xingshikou Road, Haidian District, Beijing
Email:maduohe[A T]iie.ac.cn
Research
Moving Target Defense
Moving target defense is a theory and method to transform the defense defects of existing information systems based on dynamic, randomized and diversified ideas. Its core idea is to build a dynamic, heterogeneous and uncertain cyberspace target environment to increase the attack difficulty of attackers and resist network attacks.
Cyber Deception
Cyber deception constructs the scientific cornerstone of deception defense.The goal of repudiation and deception is to influence the attacker's behavior, make it attack in the direction conducive to the defense, and build a causal relationship that has a psychological impact on the attacker due to the attack and defense behavior.
Intelligent Security
As a strategic and transformative information technology, artificial intelligence adds new uncertainty to Cyberspace Security. Artificial intelligence cyberspace security risks include network security risk, data security risk, algorithm security risk and information security risk.
Data Security Privacy Protection
The problem of privacy disclosure caused by data analysis is becoming more and more serious, and protecting private data and preventing the disclosure of sensitive information has become a new challenge. Common technologies include homomorphic encryption, differential privacy, data desensitization, privacy computing and so on.
Project
(1) Scale test and verification of software definition network (SDN) for multi service integration, participation, national level, 2015-05-2018-06
(2) Key technologies and equipment of high-performance cloud computing data center, participation, national level, October 2017 to October 2021
(3) Information application security cloud service, participation, ministerial level, 2017-01-2021-12
Work
The Fifth Research Office, Institute of information engineering, Chinese Academy of Sciences
Professional Affiliation
Visiting researcher, Institute of information countermeasure technology, School of computer science, Harbin University of Technology
Visiting researcher, Institute of financial information security, School of information, Central University of Finance and Economics
Publication
Papers:
- Quantitative Security Assessment Method based on Entropy for Moving Target Defense
In ACM Symposium on Information, Computer and Communications Security(ASIACCS). ACM,, 2017, Primary author
paper|
link
- Optimal Strategy Selection for Moving Target Defense Based on Markov Game
IEEE Access, 2017, Second author
paper|
link
- Performance Assessment Approach Based on Change-point Detection for Network Moving Target Defense
Journal on Communications, 2017, Second author
paper|
link
- Network Moving Target Defense Technique Based on Optimal Forwarding Path Migration
Journal on Communications, 2017, Second author
paper|
link
- A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks
18th International Conference on Information and Communications Security (ICICS2016), 2016, Primary author
paper|
link
- Thwart Eavesdropping Attacks on Network Communication Based on Moving Target Defense
Performance Computing and Communications Conference (IPCCC), 2016 IEEE 35th International, 2016, Primary author
paper|
link
- Moving Target Network Defense Effectiveness Evaluation Based on Change-point Detection
MPE, 2016, Second author
paper|
link
- A Moving Target Defense Approach Based on POF to Thwart Blind DDoS Attack
International Conference on Computer Communications & Networks. IEEE, 2015, Primary author
- Defending Blind DDoS Attack on SDN Based on Moving Target Defense
International Conference on Security and Privacy in Communication Networks. Springer International Publishing, 2014, Primary author
paper|
link
- WGT: Thwarting Web Attacks Through Web Gene Tree-based Moving Target Defense
IEEE International Conference on Web Services (ICWS), 2020, Second author
paper|
link
- What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense
IEEE International Performance Computing and Communications Conference (IPCCC), 2020, Second author
paper|
link
Book:
- Cyberspace Deception: the Scientific Cornerstone of Constructing Deception Defense
Cyber Degradation, Huazhang Machinery Industry Press, August 2017, Primary author
- Data Breaches(Chinese)
Award
Reward Information:
Beijing Science and technology progress first prize, first prize, provincial, 2012
Patent Achievements:
A dynamic application address translation method and its gateway system, invention, 2014, the first author, patent No.: zl201410599147.7
An SDN controlled blind DDoS attack defense method and system, invention, 2013, the first author, patent No.: zl201310516638.6
A web backdoor detection method and system based on Association tree, invention, 2013, the first author, patent No.: zl201310517193.3
A cross platform detection method and system for malicious files in cloud environment, invention, 2013, the first author, patent No.: zl201310517192.9
Welcome to this website✩