头像

姓名:吴桦

职称:副教授

电话:

办公室:计算机楼308

个人主页:

邮箱:101005557@seu.edu.cn

教育背景

工学博士 (计算机应用技术) ,东南大学,中国,2010

学术兼职

江苏省泛在网络安全工程研究中心副主任,江苏省大数据专家委员会专家委员

研究领域

网络安全,加密流量分析,网络态势感知,流媒体传输技术

研究概况

从事CERNET华东北地区网的运行管理近二十年,在此基础上,深入研究了因特网体系结构和测量管理方法,并开展了对新兴高速网络应用的研究。对网络安全态势感知、加密流量分析、流媒体应用技术进行了深入的研究。

立足应用实际需求,基于实际需求提出创新解决方法!欢迎对研究方向感兴趣的同学联系!希望联系的同学具有较好的实践能力,对利用科学方法解决现实问题有兴趣!

最近动态

研究课题

国家重点研发计划课题:海量公害网页、图片、视频流量识别技术(2021年-2024年),424.51万元,在研,主持;

国家重点研发计划子课题:基于协同感知网络的分布式网络状态快速采集、融合与分发 (2020—2023),131万元,在研,主持

国家重点研发计划子课题:SDN/NFV NDN安全研究(2017—2020),43万元,结题,主持

国家863项目:大规模编址与路由关键技术研究和验证(2015—2017),结题,参与

江苏省科技支撑计划--工业部分:基于分布式通信机理的主干网僵尸网络追踪系统(2011—2013),结题,参与

国家自然科学基金面上项目:高速网络活跃节点检测及其流量分类方法研究 (2010—2012),结题,参与

国家973计划:基于自治治理模型的网络管理与安全研究 (2009—2013),结题,参与

企业合作:视频评估关键参数与演进技术 (2017—2018),结题,参与

企业合作:基于DFI的视频关联和码率分辨率识别技术 (2015—2016),结题,参与

奖励与荣誉

江苏省科学技术协会,电子信息领域“2023年度江苏省行业领域十大科技进展”,面向高速网络的加密流量智能识别与态势感知的研发与产业化,2/7, (2023年)

江苏省人民政府,江苏省科学技术奖一等奖,Tbps级全流量态势智能感知关键技术的研发及产业化,5/11, (2021年)

江苏省人民政府,江苏省科学技术奖二等奖,基于资源可控的高速网络测量技术及其产业化应用,5/11,(2014年)

南京市科学技术委员,南京市科学技术进步奖二等奖,基于分布式通信机理的僵尸网络检测关键技术及应用,2/7,(2014年)

课程信息

学术成果

教材与专著

1.吴桦,程光,胡晓艳,高速网络态势感知与安全防御,东南大学出版社,2023.


2.程光,吴桦,胡晓艳,网络测量学,东南大学出版社,2022.


3.程光,胡茵,潘吴斌,吴桦,郭春生,蒋山青,加密流量测量和分析,东南大学出版社,2018.


4.吴桦,程光,胡劲松,徐健,新一代互联网流媒体服务及路由关键技术,东南大学出版社,2017.


5.程光,吴桦,王会羽,张军,陈玉祥,僵尸网络检测技术,东南大学出版社,2014.


6.程光,吴桦,网络行为的全息测量方法,东南大学出版社,2013.


7.龚俭,吴桦,计算机网络安全导论,东南大学出版社,2007.


发表论文

1.Jingwen Quan, Jiajia Du, Hua Wu* , Guang Cheng, Xiaoyan Hu. Efficient Short Video Identification Attack for  Scenarios with Hybrid Transmission Modes and Preloading Mechanism. MSN2024 Accepted (CCF  C)


2.吴桦*, 罗浩, 赵士顺,刘嵩涛,程光,胡晓艳. 面向HTTP/2流量多路复用特征的加密视频识别方法[J]. 软件学报, 已录用. (CCF中文 A )


3.Suyue Wang,
Hua Wu*, Guang Cheng, Xiaoyan Hu, Jing Ren, SD-MDN-TM: A traceback and mitigation integrated mechanism against DDoS attacks with IP spoofing, Computer Networks, Volume 254, 2024, 110793,ISSN 1389-1286,https://doi.org/10.1016/j.comnet.2024.110793.
JCR 1


4.
吴桦*, 王磊, 黄瑞琪,程光,胡晓艳.面向加密流量的社交软件用户行为识别[J].计算机研究与发展,2024,61(09):2321-2333. (CCF中文 A )


5.Nan Hu,
Hua Wu*, Hangyu Zhao, Shanshan Ni, and Guang Cheng, Breaking Through the Diversity: Encrypted Video Indentification Attack Based on QUIC Features, ESORICS 2024  (CCF B ).


6.RuiQi Huang,
Hua Wu*, Xiaohui Wang, Guang Cheng, Xiaoyan Hu, The secret behind Instant Messaging: video identification attack against complex protocols
Cybersecurity, accepted. (JCR 2)


7.Hangyu Zhao,
Hua Wu*, Xuqiong Bian, Songtao Liu, and etc.Unveiling the Unseen: Video  Recognition Attacks on Social Software, ACISP 2024  (CCF C)


8.
吴桦*,倪珊珊,罗浩,.一种基于HTTP/3传输特性的加密视频识别方法[J].计算机学报,2024,47(07):1640-1664. (CCF中文 A )


9.Yuanjie Zhao
Hua Wu*Liujinhan ChenSongtao LiuGuang ChengXiaoyan Hu. Identifying Video Resolution from Encrypted QUIC Streams in  Segment-combined Transmission Scenarios.NOSSDAV 2024  (CCF B )


10.
Hua Wu*,  Ziling Shao, Fuhao Yang, Guang Cheng, Xiaoyan Hu, Jing Ren, Wei Wang. PD-CPS: A practical scheme for detecting covert port scans in high-speed networks.Computer Networks.Volume 231,2023,109825, ISSN 1389-1286,https://doi.org/10.1016/j.comnet.2023.109825. 
JCR 1


11.Ziling Shao, Tingzhen. Chen, Gguang Cheng, Xiaoyan Hu, Wweina Li,
Hua Wu*, AF-FDS: An accurate, fast, and fine-grained detection scheme for DDoS attacks in high-speed networks with asymmetric routing, in IEEE Transactions on Network and Service Management, doi: 10.1109/TNSM.2023.3264278.
JCR 2


12.Liu, Songtao;
Wu, Hua*; Luo, Hao; Cheng, Guang; Hu, Xiaoyan.  Stable Fine-grained Webpage Fingerprinting: Aiming at the Unstable Realistic Network, EAI SecureComm 2023 (CCF C )


13.
Hua Wu*, Y. Liu, S. Ni, G. Cheng and X. Hu, LossDetection: Real-Time Packet Loss Monitoring System for Sampled Traffic Data, in IEEE Transactions on Network and Service Management, vol. 20, no. 1, pp. 30-45, March 2023, doi: 10.1109/TNSM.2022.3203389.
JCR 2


14.Gang Wang,
Hua Wu*, Guang Cheng, Xiaoyan Hu and Yuxin Shi, Website Fingerprinting with Packet Sampling: A More Realistic Approach in High-speed Networks, 2023 IEEE Global Communications Conference: Communication & Information Systems Security (CCF C) 


15.Weiwei Zhu,
Hua Wu*, Jingwen Quan, Guang Cheng, Xiaoyan Hu
Accurate Identification of Encrypted Videos in Asymmetric Routing ScenariosAPNOMS2023 CCF C


16.
Hua Wu*, Y. Liu, G. Cheng and X. Hu, RT-CBCH: Real-time VPN Traffic Service Identification based on Sampled Data in High-speed Networks, in IEEE Transactions on Network and Service Management, doi: 10.1109/TNSM.2023.3286446. 
JCR 2


17.Anting Lu,
Hua Wu*, Hao Luo, Guang Cheng, and Xiaoyan Hu. Real-time Platform Identification of VPN Video Streaming Based on Side-Channel Attack. IFIP SEC2023.
CCF C


18.Jinfeng Chen,
Hua Wu*, Suyue Wang, Guang Cheng, Xiaoyan Hu. An Accurate and Real-time Detection Method for Concealed Slow HTTP DoS in Backbone Network. IFIP SEC2023.
CCF C


19.Hua Wu*, Weina Li, Xiying Chen, Guang Cheng, Xiaoyan Hu, Youqiong Zhuang, Batch classifier with adaptive update for backbone traffic classification, Computer Communications,Volume 202,2023,Pages 57-72,ISSN 0140-3664,https://doi.org/10.1016/j.comcom.2023.02.013.
JCR 1


20.
Hua Wu*, Xin Li, Gang Wang, Guang Cheng, and Xiaoyan Hu. 2023. Resolution Identification of Encrypted Video Streaming Based on HTTP/2 Features. ACM Trans. Multimedia Comput. Commun. Appl. 19, 2, Article 73 (May 2023),https://doi.org/10.1145/3551891.
JCR 1


21.Zhaoxu Ge,
Hua Wu*, Guang Cheng, Xiaoyan Hu. NFlowGAN: High-utility Privacy-preserving Network Flow Synthesis based on GAN.  2023 IEEE ICC. 
CCF C


22.Shiyue Liu,
Hua Wu*, Guang Cheng, Xiaoyan Hu. Real-Time Phishing Detection Based on URL Multi-Perspective Features: Aiming at the Real Web Environment. 2023 IEEE ICC.
CCF  C


23.
Hua Wu*, Sui Yuping, Guang Cheng, Xiaoyan Hu, Qinghua Shang. Service Classification of High-Speed Network Traffic Based on Two-Stage Clustering.  The 23rd Asia-Pacific Network Operations and Management Symposium , APNOMS 2022.
CCF C


24.
Hua Wu*, Ziling Shao, Guang Cheng, Xiaoyan Hu, Jing Ren, Wei Wang. Detecting Slow Port Scans of Long Duration in High-Speed Networks.  2022 IEEE Global Communications Conference (CCF C).


25.Youqiong Zhuang,
Hua Wu*, Songtao Liu, Guang Cheng, Xiaoyan Hu. HDS: A Hierarchical Scheme for Accurate and Efficient DDoS Flooding Attack Detection.  The 23rd Asia-Pacific Network Operations and Management Symposium
APNOMS 2022 (CCF C) .  


26.Hua Wu*,Xinmeng Fan, Guang Cheng, Xiaoyan Hu. Identify IoT Devices from Backbone Networks Using Lightweight Neural Networks.2022 IEEE 47th Conference on Local Computer Networks (CCF C).


27.Hua Wu*, Yujie Liu, Guang Cheng, Xiaoyan Hu. Real-time Identification of VPN Traffic based on Counting Bloom Filter and Chained Hash Table from Sampled Data in High-speed Networks. ICC2022 (CCF C)  


28.Hua Wu*, Xuange Zhang, Tingzheng Chen, Guang Cheng, Xiaoyan Hu. IM-Shield: A Novel Defense System against DDoS Attacks under IP Spoofing in High-speed Networks. ICC2022 (CCF C)


29.
Hua Wu*, Rui Wang, Guang Cheng, Xiaoyan Hu. Service-Based Identification of Highly Coupled Mobile Applications.  2022 IEEE 47th Conference on Local Computer Networks. 
CCF C


30.Xiaoyan Hu, Xiaoyi Song, Guang Cheng, Hua Wu, Jian Gong. Efficient sharing of privacy-preserving sensing data on consortium blockchain via group key agreement, Computer Communications , Vol. 194, p44-54, 2022.
JCR 1


31.
Hua Wu*, Chengfei Zhu, Guang Cheng, Xiaoyan Hu. Real-time Application Identification of RTC Media Streams via Encrypted Traffic Analysis. The 31st International Conference on Computer Communications and Network .
CCF C


32.Xiaoyan Hu, Cheng Zhu, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong. A Deep Subdomain Adaptation Network with Attention Mechanism for Malware Variant Traffic Identification at an IoT Edge Gateway, accepted by IEEE Internet of Things Journal, 2022.
JCR 1


33.Xiaoyan Hu, Cheng Zhu, Zhongqi Tong, Wenjia Gao, Guang Cheng, Ruidong Li, Hua Wu, Jian Gong. Identifying Ethereum Traffic Based on an Active Node Library and DEVp2p Features, Future Generation Computer Systems, Vol. 132, p162~177, 2022
JCR 1


34.
Hua Wu*,Chaoqun Cui, Guang Cheng, Xiaoyan Hu. PSCM: Towards Practical Encrypted Unknown Protocol Classification. ISCC2022.
CCF C


35.
Hua Wu*,Qiuyan Wu, Guang Cheng,Shuyi Guo,Xiaoyan Hu, Shen Yan. SFIM: Identify User Behavior Based on Stable Features. Peer-to-Peer Networking and Applications.2021, Volume 14, Number 6, Page 3674-3687.
JCR 2


36.
吴桦*,于振华,程光,胡晓艳.大型指纹库场景中加密视频识别方法[J].软件学报,2021,32(10):3310-3330.CCF A


37.
Hua Wu*, Xiying Chen, Guang Cheng, Xiaoyan Hu, Youqiong Zhuang. BCAC: Batch Classifier based on Agglomerative Clustering for traffic classification in a backbone network. iWQoS2021.
CCF B


38.
Hua Wu*, Tingzheng Chen, Ziling Shao, Guang Cheng, Xiaoyan Hu. Accurate and Fast Detection of DDoS Attacks in High-Speed Network with Asymmetric Routing. Globecom2021 
CCF C


39.
Hua Wu*, Lu Wang, Guang Cheng, Xiaoyan Hu. Mobile Application Encryption Traffic Classification Based On TLS Flow Sequence Network. ICC 2021 
CCF C


40.
Hua Wu*, Shuyi Guo, Guang Cheng,Xiaoyan Hu. Detecting Tor Bridge from Sampled Traffic in Backbone Networks, NDSS 2021 workshop MADWeb 2021.


41.
Hua Wu*, Ya Liu, Guang Cheng, Xiaoyan Hu. Real-time Packet Loss Detection for TCP and UDP Based on Feature-Sketch, IEEE INFOCOM2021 Workshop Security and Privacy in Big Data .


42.
Hua Wu*, Xin LI,Guang Cheng, Xiaoyan Hu. Monitoring Video Resolution of Adaptive Encrypted Video Traffic Based on HTTP/2 Features, IEEE INFOCOM2021 Workshop GI 2021


43.
吴桦*,陈廷政.SDN环境中基于端址跳变的DDoS防御方法[J].网络空间安全,2020,11(08):17-22.


44.
胡晓艳,童钟奇,吴桦,许昱玮.基于活跃节点库的以太坊加密流量识别方法[J].网络空间安全,2020,11(08):34-39.


45.
程光,钱德鑫,郭建伟,史海滨,吴桦,赵玉宇.基于散度的网络流概念漂移分类方法[J].计算机研究与发展,2020,57(12):2673-2682.CCF中文 A


46.
Hua Wu*,Qiuyan Wu, Guang Cheng, Shuyi Guo. Instagram User Behavior Identification Based on Multidimensional Features, IEEE INFOCOM2020 Workshop MobiSec .


47.
Hua Wu*,Zhenhua Yu, Guang Cheng, Shuyi Guo. Identification of Encrypted Video Streaming Based on Differential Fingerprints, IEEE INFOCOM2020 Workshop Security and Privacy in Big Data.


48.
Hua Wu*, Yu Gu, Guang Cheng. Effectiveness Evaluation Method for Cyber Deception Based on Dynamic Bayesian Attack Graph, CSSE 2020.


49.
程光,房敏,吴桦.面向移动网络的视频初始缓冲队列长度测量方法[J].通信学报,2019,40(10):67-78. CCF中文 A


50.
Hua Wu*, Guang Cheng, Xiaoyan Hu. Inferring ADU Combinations from Encrypted QUIC Stream. CFI'19: Proceedings of the 14th International Conference on Future Internet Technologies. August 2019


51.
吴桦*,王凌,程光.基于DASH流媒体的TCP拥塞控制算法优化[J].计算机研究与发展,2019,56(09):1965-1976.CCF中文 A


52.
潘吴斌,程光,吴桦,徐健.移动网络加密YouTube视频流QoE参数识别方法[J].计算机学报, 2018,41(11):2436-2452. CCF中文 A




已授权发明专利


1. 吴桦,邵梓菱,程光,一种面向高速网络抽样数据采集场景的慢速端口扫描检测方法,申请号: 202111124600.5,授权公告号:CN  113872962 B


2. 
吴桦,庄幼琼,程光, 一种多层次信息融合的网络攻击态势实时感知方法,申请号: 202111124601.X,授权公告号:CN 114006725 B


3. 
吴桦,张暄阁,程光,一种防御高速网络中 IP地址欺骗DDoS攻击的方法,申请号:202111399436.9,授权公告号:CN114172697 B


4. 
吴桦,陈晰颖,程光,一种基于基于抽样数据流的高速网络流量分类方法,申请号:2020111302613.7,授权公告号:CN113794653 B


5. 
吴桦,崔超群,程光,一种面向应用层未知网络协议的流量分类方法,申请号:202210469493.8,授权公告号:CN114666273 B


6. 
吴桦,崔超群,程光,陈锦锋,李维娜,一种分布式网络全局态势感知数据高速传输方法,申请号:202111193364.2,授权公告号:CN113949554 B


7. 
吴桦,陈晰颖,程光,一种基于半监督学习的应用流自动分类方法,申请号:2020110102859,授权公告号:CN112187664 B


8. 
吴桦,刘亚,周煦彭,程光,一种基于流量分析的视频卡顿检测方法,申请号: 2020110363007,授权公告号:CN112188273 B


9. 
吴桦,郭树一,程光, 一种高速主干网中Tor网桥的快速识别方法, 申请号: 2020110034705,授权公告号:CN112187774 B


10. 
吴桦,李欣,程光,一种基于HTTP/2传输特征的加密数据长度还原方法,申请号: 2020110123910,授权公告号:CN112235254 B


11. 
吴桦,刘亚,程光,一种面向高速网络的流量丢包状态实时感知方法,申请号: 2021104149693,授权公告号:CN113055251 B


12. 
吴桦,程光,一种接入网服务商监测用户到视频服务器延迟特性方法,申请号: 201510964462X,授权公告号:CN 105611406 B


13. 
吴桦,程光,一种识别QUIC协议加密传输的YouTube DASH视频的方法,申请号: 2019102384598,授权公告号:CN 110062255 B


14. 
吴桦,程光,房敏,一种面向YouTube DASH加密视频的指纹库构建方法,申请号:2018111298169,  授权公告号:CN 109511011 B


15. 
吴桦,程光,一种识别TLS协议加密传输YouTube DASH视频的方法,申请号: 2018113811898,授权公告号: CN 109391627 B


16. 
吴桦,吴秋艳,程光,于振华,一种精准复原TLS协议加密传输数据明文长度指纹的方法,申请号:2019107826937,授权公告号: CN 110602059 B


17. 
吴桦,于振华,程光,一种提取加密网络流量中TLS数据块的方法,申请号: 2019108372753,授权公告号: CN 110620766 B


18. 
吴桦,顾煜,程光,周余阳,一种基于动态贝叶斯攻击图的网络欺骗效能评估方法,申请号: 2020101155062,授权公告号: CN 111371758 B


19. 
吴桦,陈廷政,程光,邵梓菱,一种面向高速网络分组抽样数据采集场景的DDoS攻击检测方法,申请号: 202110414973X,授权公告号: CN 113114694 B


20.
胡晓艳,龚俭,程光,吴桦,一种缓解命名数据网络中内容毒害攻击的方法,申请号: 2018101446484, 授权公告号:CN108574690 B


21.
胡晓艳,朱成,程光,吴桦,龚俭,一种精准的恶意流量变种检测方法,申请号: 202110469814X, 授权公告号:CN113194092 B


22. 胡晓艳,陈浩,程光,吴桦,龚俭,一种具备高抗检测能力的对抗域名生成模型,申请号: 2021109912332,授权公告号:CN113709152 B


23. 胡晓艳,栗淼,程光,吴桦,龚俭,一种有限训练样本下基于对比学习的恶意域名检测方法,申请号: 202111294445,授权公告号:CN114095216 B


24.
程光,赵玉宇,顾周超,吴桦,一种基于SRv6的网络遥测方法,申请号: 2021113337865,授权公告号:CN114050994B                                                     

25. 程光,赵玉宇,吴桦,袁帅,张慰慈,一种基于可编程节点的软硬件结合威胁态势感知方法,申请号: 2020108896821,授权公告号:CN112055007 B


26. 胡晓艳,童钟奇,程光,吴桦,许昱伟,张玉健,一种轻量化以太坊加密流量识别方法,申请号: 2020105843678,授权公告号:CN111865823B

                                            

27. 胡晓艳,舒卓卓,程光,吴桦,龚俭,一种比特币挖矿僵尸网络流量的快速识别方法,申请号: 2021104872593,授权公告号:CN113518073 B


28. 程光,李峻辰,胡晓艳,吴桦,赵丽侠,基于中央控制器缓解命名数据网络中内容毒害攻击的方法,申请号:2019108910474,授权公告号:CN110650133 A


29. 胡晓艳,尹君,郑少琦,程光,吴桦,一种基于网络编码的命名数据网络中内容缓存方法,申请号:201911278816X ,授权公告号:CN111107000 B




其他