Biblio

Filters: Author is Sun, Bo  [Clear All Filters]
2017-05-16
Guo, Huan, Li, Zhengmin, Liu, Qingyun, Li, Jia, Zhou, Zhou, Sun, Bo.  2016.  A High Performance IPv6 Flow Table Lookup Algorithm Based on Hash. Proceedings of the 2016 ACM International on Workshop on Traffic Measurements for Cybersecurity. :35–39.

With the rapid increasing IPv6 network traffic, some network process systems like DPI and firewall cannot meet the demand of high network bandwidth. Flow table based on hash is one of the bottlenecks. In this paper, we measure the characteristics of IPv6 address and propose an entropy based revision hash algorithm, which can produce a better distribution within acceptable time. Moreover, we use a hierarchical hash strategy to reduce hash table lookup times further more even in extreme cases.

2017-09-19
Sun, Bo, Fujino, Akinori, Mori, Tatsuya.  2016.  POSTER: Toward Automating the Generation of Malware Analysis Reports Using the Sandbox Logs. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. :1814–1816.

In recent years, the number of new examples of malware has continued to increase. To create effective countermeasures, security specialists often must manually inspect vast sandbox logs produced by the dynamic analysis method. Conversely, antivirus vendors usually publish malware analysis reports on their website. Because malware analysis reports and sandbox logs do not have direct connections, when analyzing sandbox logs, security specialists can not benefit from the information described in such expert reports. To address this issue, we developed a system called ReGenerator that automates the generation of reports related to sandbox logs by making use of existing reports published by antivirus vendors. Our system combines several techniques, including the Jaccard similarity, Natural Language Processing (NLP), and Generation (NLG), to produce concise human-readable reports describing malicious behavior for security specialists.