10bet手机版app

 

 

姓名:杨家海

职称:10bet

电话:+86 10 62783492

邮箱:yang@cernet.edu.cn

实验室主页: //xyhdmd.com/nmgroup_

1966年9月出生于浙江省,1992年硕士毕业于10bet体育网,获工学硕士学位后留校任教,2003年获得10bet工学博士学位。1994至1999年担任10bet网络中心/CERNET网络中心运行室主任,1999年公派赴美,在George Mason大学作访问10bet,并于2000年6在贝尔实验室担任访问研究员一年。现为10bet网络科学与网络空间研究院党委副书记、长聘10bet、博士生导师、研究院学术委员会副主任、网络管理和测量技术实验室主任、10bet信息化技术中心副主任、手机版app学位分委员会委员。

教育背景

工学博士 (体育网统结构), 10bet, 中国, 2003.

工学硕士 (体育网统结构), 10bet, 中国, 1992;

工学学士 (手机版应用), 北京工商大学, 中国, 1989;

社会兼职

John Wiley & Sons International Journal of Network Management(IJNM)期刊(SCI检索),编委,2012~

IEEE Transactions on Network and Service Management(TNSM) (SCI检索)期刊,编委,2014~

《手机版科学》期刊编委会委员,2019.5~

《网络空间安全》期刊编委会副主任,2019.1~

担任IEEE/IFIP Network Operations and Management Symposium(NOMS), IFIP/IEEE International Symposium on Integrated Network Management(IM), Asia-Pacific Network Operations and Management Symposium (APNOMS),International Conference on Passive and Active Measurement等多个国际学术会议的程序委员会成员及Publication、Publicity co-chairs。

中国手机版学会高级会员,开放系统专业委员会副主任委员(2007-2015)、分布式计算与系统专业委员会委员;

北京市手机版学会理事(2008~);

国际电气和电子工程师协会IEEE高级会员(2000~);

此外,还担任国家科学技术奖励评审委员、教育部科学技术奖励评审委员、北京市科技奖励评审专家、国家“863”项目评审专家、科技部国际合作项目评审专家等。

研究领域

IPv6及新一代互联网体系结构

互联网络管理

网络测量与网络空间安全

云计算、虚拟化及资源管理调度

研究概况

近年来,我主要从事互联网络行为测量、网络空间安全态势感知、以及虚拟化云计算环境下的资源管理调度等方面的科研和教学工作:

1、网络全息测量和网络行为学研究。真实地了解甚至预测网络的行为,对于网络的运行和未来互联网的演进都至关重要,但网络的真实特性和导致这一特性的真实原因往往很难通过某一方面的数据来判断,很多问题都是相互关联的,对于互联网这样的复杂巨系统更是如此,因此了解网络必须有全面的信息。不仅要研究通常的流量数据、SNMP信息、路由信息和性能信息,而且需要全面考查用户行为信息、应用系统信息、设备和系统日志、IP和用户信息和底层通信系统信息。在全面研究全息测量本身的理论和关键技术的基础上,研究网络的动态行为,动力学特征,网络行为的变化规律等。

2、网络安全和安全态势感知。互联网络已深刻地融入到人类生产生活的方方面面,迅疾地改变着人们的生活形态甚至生存状态;另一方面,互联网络又正面临着越来越多的安全威胁,网络攻击事件层出不穷,且愈演愈烈,导致的经济损失规模也越来越大,年损失达几千亿美元。网络空间安全问题的重要性日益凸显,我们将研究基于测量的网络安全分析和建模技术;此外,网络空间安全的攻防将长期处于激烈的博弈状态,正所谓道高一尺魔高一丈,需要从网络全局出发研究立体式感知网络安全态势的各层面问题,包括网络微观态势感知、基于大数据和机器学习技术的多源异构数据分析与高效融合、宏观态势评估与威胁识别、安全攻击事件的追踪溯源等。

3、云计算和虚拟化。云计算技术为计算服务模式带来了革命性的变化,云计算的基础和核心是虚拟化技术。虽然当前云计算服务已经在一定程度上实现了商业化,但围绕云计算和虚拟化的资源管理和调度优化问题仍然是学术界的研究热点,尤其是随着软件定义网络SDN和网络功能虚拟化NFV(Network Function Virtualization)时代的到来,如何从云服务提供商的角度,研究更高效和更具弹性的资源调度方法,提高资源利用率和服务吞吐率;如何从云服务租户的角度,研究更高效的资源调度方案,以更低的成本获得更及时或/和更有服务质量保证的服务。

奖励与荣誉

 作为骨干人员参加的科研项目获奖情况如下:

(1)  中国通信学会科技进步奖,二等,面向云计算和互联网业务的IPv6商用部署技术研发及大规模应用,和阿里联合申报,本人排名第4(10bet排名第1),2019年11月

(2)  The Okawa Foundation Research Grant(日本大川基金研究奖),On the Research of Efficient Malicious Domain Detection System, 2019年10月

(3)  基于形式化方法的互联网协议测试关键技术及其应用,中国电子学会技术发明一等奖,2016年12月。

(4)  中国下一代互联网示范工程CNGI示范网络核心网CNGI-CERNET2/6IX,教育部科技进步一等奖,2007年1月。

(5)  app宽带信息网(3TNet)关键技术,上海市科技进步一等奖,2007年12月。

(6)  下一代互联网发展战略研究,国家发改委机关优秀研究成果奖三等奖,2004年4月。

(7)  手机版信息网络及其应用关键技术研究,2001中国高校科技进步一等奖。

(8)  中国教育和科研手机版网CERNET示范工程项目,1996年国家教委科技进步一等奖。

(9)  北京商品交易所手机版交易系统,1996年电子部科技进步二等奖,并获得1994年全国十大电子成果称号。

(10)  COSA国产系统软件平台,1996年电子部八五科技攻关重大成果奖和科技进步特等奖。

学术成果

1. 期刊论文

[1]   Hui Yu, Jiahai Yang, Hui Wang, Hui Zhang. Towards Predictable Performance via Two-layer Bandwidth Allocation in Cloud Datacenter, Elsevier Journal of Parallel and Distributed Computing, Vol. 126, April 2019: 34-47

[2]   Jianping Weng, Hui Wang, Jiahai Yang, Yang Yang. Root Cause Analysis of Anomalies of Multitier Services in Public Clouds. IEEE/ACM Transactions on Networking, Vol. 26, No. 4, pp. 1646-1659, Aug. 2018

[3]   Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, et al, Towards Zero-Time Wakeup of Line Cards in Power-Aware Routers. IEEE/ACM Transactions on Networking, 24(3):1448-1461, 2016.

[4]   Cong Xu, Jiahai Yang, Kevin Yin, Hui Yu, Optimal Construction of Virtual Networks for Cloud-based MapReduce Workflows, Elsevier Computer Networks, 112(2017): 194-207,  http://dx.doi.org/10.1016/j.comnet.2016.11.001

[5]   Xiao Ling, Yi Yuan, Dan Wang, Jiangchuan Liu, Jiahai Yang, Joint Scheduling of MapReduce Jobs with Servers: Performance Bounds and Experiments, Elsevier Journal of Parallel and Distributed Computing, Vol. 90-91, No. 4, pp52-66

[6]   Fuliang Li, Jiahai Yang, Xingwei Wang, et al, Characteristics analysis at prefix granularity: A case study in an IPv6 network, Journal of Network and Computer Applications, Vol. 70, No. 7, pp. 156–170, Jul. 2016 (doi:10.1016/j.jnca.2016.02.022

[7]   Jiahai Yang, Mingwei Xu, Hui Wang, Wenlong Chen, Yuan Yang, Qingzhou Dong, Yang Wang, IER: ID-ELoc-RLoc Based Architecture for Next Generation Internet, Chinese Journal of Electronics,Dec. 2014, Vol. 31, No. 6, pp 519-536, Date: 20 Jan 2015

[8]   Fuliang Li, Jiahai Yang, Changqing An, Jianping Wu, Towards Centralized and Semi-automatic VLAN Management. International Journal of Network Management, v 25, n 1, p 52-73, January 1, 2015

[9]   Qing Li, Mingwei Xu, Dan Wang, Jun Li, Yong Jiang, Jiahai Yang, Nexthop-Selectable FIB aggregation: An instant approach for internet routing scalability, Computer Communications, v 67, p 11-22, August 1, 2015

[10]   Hui Wang, Jeffrey Cai, Jerry Lu, Kevin Yin, Jiahai Yang, Solving Multicast Problem in Cloud Networks Using Overlay Routing,Computer Communications, v 70, p 1-14, October 1, 2015

[11]   Fuliang Li, Changqing An, Jiahai Yang, Xingwei Wang, Jianping Wu, Linchuan Xu, Xin Xu, Data Mapping Principles and Algorithms for Self-configurable Systems, China  Communications , 12(10): 169-181.

[12]   Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, A Study of Traffic from the Perspective of a Large Pure IPv6 ISP, Computer Communications, 2014, 37:40-52, Jan. 2014

[13]   Fuliang Li, Jiahai Yang, Huijing Zhang, Jianping Wu, Configuration Analysis and Recommendation: Case Studies in IPv6 Networks, Computer Communications, 2014, 53:37-51, Nov. 2014

[14]   Fu Chen, Jiahai Yang, Shaobin Zhan, MulCNeT: Network management cloud, International Journal of Grid and Distributed Computing, v 7, n 2, p 139-150, 2014

[15]   Donghong Qin, Jiahai Yang, Hui Wang, Experimental Study on Diversity and Novelty of Interdomain Paths, Chinese Journal of Electronics, 2013 Vol. 22 (CJE-1): 160-166

[16]   M. Xu,M. Hou, D. Wang, J. Yang, An efficient critical protection scheme for intra-domain routing using link characteristics, Computer Networks, v 57, n 1, p 117-133, January 16, 2013

[17]   Bin Zhang, Jiahai Yang, Jianping Wu, et al. MBST: Detecting Packet-level Traffic Anomalies by Feature Stability, The Oxford Computer Journal, v 56, n 10, p 1176-1188, Oct. 2013

[18]   Zhang B, Yang JH, Wu JP et al, Diagnosing Traffic Anomalies Using a Two-phase Model, Journal of Computer Science and Technology, 27(2): 313-327, Mar. 2012

[19]   Jessie Hui Wang, Changqing An, Jiahai Yang, A study of traffic, user behavior and pricing policies in a large campus network, Elsevier Computer Communications, v 34, n 16, p 1922-1931, October 1, 2011

[20]   Jianping Wu, Jessie Hui Wang, Jiahai Yang, CNGI-CERNET2: an IPv6 Deployment in China, ACM SIGCOMM Computer Communication Review, Vol. 41, No. 2, April 2011: 48-52

[21]   Hui Wang, Jiahai Yang, Chungang Wang, Key Strategies in P2P Systems and ISPs' P2P Traffic Management: A Survey, Springer Journal Peer-to-Peer Networking and Applications, v 4, n 4, p 410-419, December 2011

[22]   Jiahai Yang, Hui Zhang, Jinxiang Zhang, et al. Towards Next Generation Internet Management: CNGI-CERNET2 Experiences. Journal of Computer Science and Technology, 2009, 24(3): 482-494, May 2009.

[23]  杨洋,杨家海,秦董洪,王于丁,凌晓,DraLCD:一种新的数据中心流量工程方法,电子学报,2017,45 (5): 1261-1267

[24]   王于丁,杨家海. DACPCC: 一种包含访问权限的云计算数据访问控制方案[J]. 电子学报, 2018, 46(1): 236-244.(EI源刊.)

[25]   杨洋,杨家海,温皓森. 基于时隙传输的数据中心路由算法设计[J]. 软件学报, 2018, 29(8): 2485?2500.(EI源刊)

[26]   张晓丽,杨家海,孙晓晴,吴建平. 分布式云的研究进展综述[J]. 软件学报, 2018, 29(7): 2116-2132.(EI源刊)

[27]   杨洋,杨家海,秦董红, 一种数据中心网络多路径路由算法研究,10bet学报(自然科学版),v 56, n 3, p 262-268, March 1, 2016

[28]   文坤,杨家海,程凤娟等,骨干网络中RoQ攻击的监测、定位和识别,手机版研究与发展,2015, 52(4): 813-822

[29]   王于丁,杨家海,徐聪,凌晓,杨洋,云计算访问控制技术研究综述. 软件学报, 2015, 26(5): 1129-1150

[30]   杨洋,杨家海,王会等,IP网络时延敏感型业务流自适应负载均衡算法,通信学报,2015,36(3): 2015082-1 – 2015082-11

[31]   杨家海,焦亮,秦董洪等,基于BGP路由表的域间路径特性实验研究,10bet学报(自然科学版),2015, 55(11): 1190-1196

[32]   李福亮, 杨家海, 吴建平, 安常青, 姜宁:互联网自动配置研究, 软件学报, 2014, 25(1): 118-134, 2014年1月.

[33]   文坤,杨家海,张宾,低速率拒绝服务攻击研究与最新进展综述,软件学报, 2014,  25(3): 591-605, 2014年3月

[34]   杨芫,徐明伟,杨家海等,SAMS:一种新型身份/位置分离方案,手机版学报,2014, 37(2): 394-406, 2014年2月

[35]   秦董洪,杨家海,杨洋,张辉,UMIR系统设计与实现,通信学报,2013,34(Z2):27-35,2013年9月

[36]   杨家海,姜宁,安常青,李福亮,基于形式化描述的交换机网络自动配置策略的设计与实现,10bet学报(自然科学版),2012年,52(8):1041-1048

[37]   崔来中,吴建平,江勇,杨家海,一种非结构化P2P流媒体系统拓扑构建算法,10bet学报(自然科学版),2011, 51(12):1819-1823

[38]   杨家海,郭玺,张辉,基于多层次和多粒度的混合布局可视化算法及其应用,10bet学报(自然科学版),2011, 51(12):1765-1770,1776

[39]   陈福,杨家海,杨杨等,网络服务行为的进程代数验证方法研究及其应用,手机版学报,2011, 34(9):1660-1668

[40]   张宾,杨家海,吴建平, Internet流量模型分析与评述, 软件学报,2011,22(1):115-131

[41]   朱应武, 杨家海, 张金祥,基于流量信息结构的异常检测研究,软件学报,2010,21(10):2573-2583

[42]   王若曈,张辉,杨家海,黄桂奋,P2P网络管理系统信息模型的设计与实现,通信学报,2010,31(1): 85-91

[43]   黄桂奋,杨家海,张辉,王若曈,支持跨域协作的P2P网络管理系统设计与实现,10bet学报(自然科学版), 2010,50(4):547-550

[44]   周苗,杨家海,基于滑动地址序列的IPv6网络拓扑发现引擎,10bet学报(自然科学版),2009,49(8): 1241-1244

[45]   鲁文斌,杨家海,刘洪波,基于节点连接模式的P2P节点识别算法,10bet学报(自然科学版),2009,49(7): 1029-1033

[46]   周 苗, 杨家海, 刘洪波, 吴建平,Internet网络拓扑建模,软件学报,2009,20(1):109-123

2. 学术会议论文

[1]   Xiaoqing Sun, Mingkai Tong, Jiahai Yang, et al, HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification, The 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), Sep. 23-25, 2019, Beijing, China 

[2]   Hui Yu, Jiahai Yang, Carol Fung. Elastic Network Service Chain with Fine-grained Vertical Scaling. IEEE Globecom 2018, 9-13 Dec. 2018, Abu Dhabi, UAE

[3]   Ziyu Wang, Jiahai Yang, Shize Zhang, et al. Robust Regression for Anomaly Detection. IEEE International Conference on Communications, 21-25 May 2017, Paris, France

[4]   Weng Jian Ping, Wang Hui, Yang Jiahai and Yang Yang. Root Cause Analysis of Anomalies of Multitier Services in Public Clouds. International Workshop on Quality of Service. (IWQoS), 14-16 June 2017, VILANOVA I LA GELTRú, SPAIN

[5]   Xiaoli Zhang, Qi Li, Jianping Wu, Jiahai Yang. GAS: Generic and Agile Service Function Chain Verification on Cloud, 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), 14-16 June 2017, VILANOVA I LA GELTRú, SPAIN

[6]   Xiao Ling, Yi Yuan, Dan Wang, Jiahai Yang, Tetris: Optimizing Cloud Resource Usage Unbalance with Elastic VM, IEEE/ACM International Symposium on Quality of Service 2016 (IWQoS 2016), Jun. 20-21, 2016, Beijing, China

[7]   Chen Fu, Lin Chuang, Yang Jiahai, Xue Yuemei, A Study on Online Social Networks Theme Semantic Computing Model, 23rd IEEE International Conference on Web Services (ICWS), San Francisco, USA, Jun. 27-Jul. 2, 2016, pp. 244-251, doi:10.1109/ICWS.2016.39

[8]   Hui Yu, Jiahai Yang, Hui Wang, et al, SpongeNet+: A Two-layer Bandwidth Allocation Framework for Cloud Datacenter, The 18th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC 2016), Sydney, Australia, 12-14 Dec. 2016.

[9]   Xiao Ling, Jiahai Yang, Ye Wang, et al, Fast Community Detection in Large Weighted Networks Using GraphX on Cloud, The 18th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC 2016), Sydney, Australia, 12-14 Dec. 2016.

[10]   Ziyu Wang, Jiahai Yang, Shize Zhang, et al, Automatic Model Selection for Anomaly Detection, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), Tianjin, China, 23-26 Aug. 2016.

[11]   Hui Yu, Jiahai Yang, Cong Xu, et al, SpongeNet: Towards Bandwidth Guarantees of Cloud Datacenter with Two-phase VM Placement, the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul, Turkey, 25-29 Apr. 2016.

[12]   Ziyu Wang, Jiahai Yang, Chenxi Li, et al, Towards online anomaly detection by combining multiple detection methods and Storm, the 15th IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul, Turkey, 25-29 Apr. 2016.

[13]   Xiao Ling, Jiahai Yang, Dan Wang, Ye Wang, Cluster Scheduler on Heterogeneous Cloud, IEEE HPCC 2015, Aug. 24-26, 2015, New York, USA.

[14]   Chenxi Li, Jiahai Yang, Ziyu Wang, et al, A Lightweight DDoS Flooding Attack Detection Algorithm Based on Synchronous Long Flows, IEEE GLOBECOM 2015, Dec. 5-10, 2015, San Diego, CA, USA.

[15]   Cong Xu, Jiahai Yang, Di Fu, Hui Zhang, Towards Optimal Collaboration of Policies in the Two-phase Scheduling of Cloud Tasks”, in 11th IFIP International Conference on Network and Parallel Computing (NPC) , Sep. 18-20, 2014, Ilan, Taiwan, v 8707 LNCS, p 306-320.

[16]   Cong Xu, Jiahai Yang, Hui Yu, Haizhuo Lin, Hui Zhang, Optimizing the topologies of virtual networks for cloud-based big data processing, in16th IEEE International Conference on High Performance Computing and Communications (HPCC), Aug. 20-22, 2014, Paris, France.

[17]   Ziyu Wang, Jiahai Yang, Fuliang Li, A New Anomaly Detection Method Based on IGTE and IGFE, 10th International Conference on Security and Privacy in Communication Networks (SecureCom), Sep. 24-26, 2014, Beijing, China.

[18]   Ziyu Wang, Jiahai Yang, Fuliang Li, An On-line Anomaly Detection Method Based on A New Stationary Metric----Entropy-Ratio, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2014), Sep. 24-26, 2014, Beijing, China.

[19]   Kun Wen, Jiahai Yang, Fengjuan Cheng, et al, Two-stage detection algorithm for RoQ attack based on localized periodicity analysis of traffic anomaly, 23rd International Conference on Computer Communication and Networks (ICCCN), Aug. 4-7, 2014, Shanghai, China

[20]   Tian Pan, Ting Zhang, Junxiao Shi, Yang Li, Linxiao Jin, Fuliang Li, Jiahai Yang, Bin Liu. Towards Zero-Time Wake-Up of Line Cards in Power-Aware Routers. INFOCOM, Toronto, Canada, IEEE, 2014, pp.190-198.

[21]   Zejia Chen, Jiahai Yang, Hui Wang, A Cascading Framework for Uncovering Spammers in Social Networks, IFIP Networking 2014, June 2-4, 2014, Trondheim, Norway

[22]   Miao Li, Hui Wang, Jiahai Yang, et al, A Value Based Framework for Provider Selection of Regional ISPs, IFIP/IEEE NOMS 2014, May 4-9, 2014, Krakow, Poland

[23]   Fuliang Li, Jiahai Yang, Jianping Wu, et al, CSS-VM: A Centralized and Semi-automatic System for VLAN Management, IEEE/IFIP IM 2013

[24]   Cong Xu, Jiahai Yang, Xiao Ling, et al, Architecture Design for Management as a Service Cloud, IEEE/IFIP IM 2013

[25]   Bin Zhang, Jiahai Yang, Jianping Wu, et al, PCA-subspace Method— Is it Good Enough for Network-wide Anomaly Detection, IEEE/IFIP NOMS 2012, Maui, Hawaii, April 15-21, 2012

[26]   Lei Gao, Jiahai Yang, Hui Zhang, et al, What’s Going On in Chinese IPv6 World, IEEE/IFIP NOMS 2012, short paper, Maui, Hawaii, April 15-21, 2012

[27]   Jessie Hui Wang, Yang Wang, Mingwei Xu, Jiahai Yang, Separating Identifier from Locator with Extended DNS, IEEE International Conference on Communications 2012 (ICC 2012), June 10-15, 2012, Ottawa, Canada.

[28]   Fuliang Li, Changqing An, Jiahai Yang, Jianping Wu, Zejia Chen,Unravel the Characteristics and Development of Current IPv6 Network,37th Annual IEEE Conference on Local Computer Networks,Clearwater, Florida, 2012

[29]   Bin Zhang, Jiahai Yang, Jianping Wu, An Efficient Parallel TCAM Scheme for the Forwarding Engine of the Next-generation Router, IFIP/IEEE Int’l Symp. on Integrated Network Management, May 23-28, 2011, Dublin, Ireland, pp.454-461

[30]   Qing Li, Dan Wang, Mingwei Xu, Jiahai Yang, On the Scalability of Router Forwarding Tables: Nexthop-Selectable FIB Aggregation, IEEE INFOCOM’2011 (The 30th IEEE Int’l Conf. on Computer Communications: mini-conference) , 10-15 Apr. 2011: 321-325

[31]   Bin Zhang, Jiahai Yang, Jianping Wu,Qi Li, Efficient Searching with Parallel TCAM Chips, The 35th IEEE Conference on Local Computer Networks, LCN 2010, 11-14 Oct. 2010, Denver, Colorado, U.S.A.

[32]   Meijia Hou, Dan Wang, Mingwei Xu, Jiahai Yang, Selective Protection: A Cost-Efficient Backup Scheme for Link State Routing, The 29th IEEE Int’l Conference on Distributed Computing Systems (ICDCS 2009), 2009:68-75

[33]   Jianping He, Jiahai Yang, Changqing An, et al. BPR: a Bit-level Packet Recovery in Wireless Sensor Networks. ACM SAC’09 (The 24th Annual ACM Symposium on Applied Computing), Mar. 2009, Honolulu, Hawaii, USA.

3. 教材和专著

[1]   杨家海,任宪坤,王佩瑜,网络管理原理与实现技术,10bet出版社,2000年,北京

[2]   杨家海,吴建平,安常青,互联网络测量理论与应用,人民邮电出版社,2009年10月,北京

[3]   杨家海,安常青,网络空间安全—拒绝服务攻击检测与防御,人民邮电出版社,2019年1月,北京

 

竟博电竞官方网站万博manbext体育滚球官方万博manbext体育滚球官方