Xin FENG

Work place: School of Computer Science and Technology Changchun University of Science and Technology

E-mail: qianxiaweiguang@126.com

Website:

Research Interests: Software Engineering, Computer systems and computational processes, Computer Architecture and Organization, Database Management System, Data Structures and Algorithms

Biography

Xin FENG, Ph.D.,Associate Professor of School of Computer Science and Technology in Changchun University of Science and Technology. His research interests include Internet of Things technology and applications, software engineering and information system, database and data mining.

Author Articles
A Multi-agent System-based Method of Detecting DDoS Attacks

By Xin Zhang Ying ZHANG Raees ALTAF Xin FENG

DOI: https://doi.org/10.5815/ijcnis.2018.02.07, Pub. Date: 8 Feb. 2018

Distributed denial of service attacks are the acts aiming at the exhaustion of the limited service resources within a target host and leading to the rejection of the valid user service request. During a DDoS attack, the target host is attacked by multiple, coordinated attack programs, often with disastrous results. Therefore, the effective detection, identification, treatment, and prevention of DDoS attacks are of great significance. Based on the research of DDoS attack principles, features and methods, combined with the possible scenarios of DDoS attacks, a Multi-Agent System-based DDoS attack detection method is proposed in this paper to implement DDoS attack detection for high-load communication scenarios. In this paper, we take the multi-layer communication protocols into consideration to carry out categorizing and analyzing DDoS attacks. Especially given the high-load communication scenarios, we make an effort to exploring a possible DDoS attack detection method with employing a target-driven multi-agent modeling methodology to detect DDoS attacks relying on considering the inherent characteristics of DDoS attacks. According to the experiments verification, the proposed DDoS attack detection method plays a better detection performance and is less relevant with the data unit granularity. Meanwhile, the method can effectively detect the target attacks after the sample training. The detection scheme based on the agent technology can reasonably perform the pre-set behaviors and with good scalability to meet the follow-further requirements of designing and implementing the prototype software.

[...] Read more.
A Dynamic Feedback-based Load Balancing Methodology

By Xin Zhang Jinli LI Xin FENG

DOI: https://doi.org/10.5815/ijmecs.2017.12.07, Pub. Date: 8 Dec. 2017

With the recent growth of Internet-based application services, the concurrent accessing requests arriving at the particular servers offering application services are growing significantly. It is one of the critical strategies that employing load balancing to cope with the massive concurrent accessing requests and improve the access performance is. To build up a better online service to users, load balancing solutions achieve to deal with the massive incoming concurrent requests in parallel through assigning and scheduling the work executed by the members within one server cluster. In this paper, we propose a dynamic feedback-based load balancing methodology. The method analyzes the real-time load and response status of each single cluster member through periodically collecting its work condition information to evaluate the current load pressure by comparing the learned load balancing performance with the preset threshold. In this way, since the load arriving at the cluster could be distributed dynamically with the optimized manner, the load balancing performance could thus be maintained so that the service throughput capacity would correspondingly be improved and the response delay to service requests would be reduced. The proposed result is contributed to strengthening the concurrent access capacity of server clusters. According to the experiment report, the overall performance of server system employing the proposed solution is better.

[...] Read more.
Other Articles