简 历:
2016年9月 — 今:中科院计算所,副研究员
2014年9月 — 2016年9月:中科院计算所,助理研究员
2009年7月 — 2014年9月:法国格勒诺贝尔大学,中国科学院大学,博士
2004年9月 — 2007年7月:北京邮电大学,电信工程学院,硕士生
2000年9月 — 2004年7月:北京邮电大学,电信工程学院,本科生
主要论著:
期刊文章:
[1] Wei Xiong, Yang Wang, Haiyang Jiang, and Hongtao Guan. "Graph‑Based Fast‑Flux Domain Detection Using Graph Neural Networks", Available at SSRN 4872037.
[2] Ru Jia, Haiyang Jiang, Zhenyu Li, Gaogang Xie, "Dynamic Instrumentation Based Performance Measurement For Software Based Network Functions[J]" . Journal of Computer Research and Development. Accepted
[3] Yang D, Li Z, Haiyang Jiang, et al. "A deep dive into DNS behavior and query failures[J]". Computer Networks, 2022, 214: 109131.
[4] Haiyang Jiang, LI X, YANG Y, "Distance Comparison Based Parallel Pattern Matching[J]", Journal of Electronics and Information Technology, 2022, 44(2): 581-590.
[5] Ran Tian, Zulong Diao, Haiyang Jiang, Gaogang Xie, "Cognition: Accurate and Consistent Linear Log Parsing using Template Correction[J]". Journal of Computer Science and Technology. doi: 10.1007/s11390-021-1691-3
[6] Yang Y, Haiyang Jiang, Wu Y, et al. "C2QoS: Network QoS guarantee in vSwitch through CPU-cycle management[J]", Journal of Systems Architecture, 2021: 102148.
[7] Ye Yang, Haiyang Jiang, Guangxing Zhang, Xin Wang, Yilong Lv, Xing Li, Serge Fdida, Gaogang Xie, "S2H: Hypervisor as a setter within Virtualized Network I/O for VM isolation on cloud platform", Comput. Networks 201: 108577 (2021)
[8] Haiyang Jiang, et al. "High-performance parallel NIDS on ManyCore processors", Chinese High Technology Letters; 2014-09 [in Chinese]
[9] Shuguang W, Peng H, Haiyang Jiang, et al. "NFCloud: Network Function Virtualization System Upon OpenContrail[J]", Information and Communications Technologies, 2016.[in Chinese]
会议文章:
[1] Ru Jia, Heng Pan, Haiyang Jiang, Serge Fdida, and Gaogang Xie. "Towards Diagnosing Accurately the Performance Bottleneck of Software-Based Network Function Implementation", In International Conference on Passive and Active Network Measurement, pp. 227-253. Cham: Springer Nature Switzerland, 2023.
[2] Tian R, Diao Z, Haiyang Jiang, et al. "LogDAC: A Universal Efficient Parser-based Log Compression Approach[C], //ICC 2022-IEEE International Conference on Communications. IEEE, 2022: 3679-3684.
[3] Liu F, Haiyang Jiang, Diao z, et al. "CyCo: A Time Series Labeling Method Based on Temporal Cycle Consistency", International Joint Conference on Neural Network, (IJCNN 2021)
[4] Tian R, Diao Z, Haiyang Jiang, et al. "NeVe: A Log-based Fast Incremental Network Feature Embedding Approach[C]" //2021 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2021: 1-7.
[5] Wang Y, Zhang G, Haiyang Jiang, et al. "Compact-index: an efficient index algorithm for network traffic[C]" //Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies. 2021: 90-103.
[6] Xiong W, Haiyang Jiang, Guan H, et al. "DSQNet: Domain SeQuence based Deep Neural Network for AGDs Detection[C]", IEEE Symposium on Computers and Communications (ISCC). IEEE, 2021: 1-7.
[7] Liu, Fengrui, Xuefei Li, Wei Xiong, Haiyang Jiang, and Gaogang Xie. "An accuracy network anomaly detection method based on ensemble model." In ICASSP 2021-2021 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 8548-8552. IEEE, 2021.
[8] Yang Y, Haiyang Jiang, Liang Y, et al. "Isolation Guarantee for Efficient Virtualized Network I/O on Cloud Platform", the 22nd IEEE International Conferences on High Performance Computing and Communications (HPCC 2020)
[9] Yang Y, Haiyang Jiang, Wu Y, et al. "C2QoS: CPU-Cycle based Network QoS Strategy in vSwitch of Public Cloud", the 17th IFIP/IEEE International Symposium on Integrated Network Management (IM 2021)
[10] Haiyang Jiang, et al. "A Massively Multi-Tenant Virtualized Network Intrusion Prevention Service on NFV Platform", 28th International Conference on Computer Communication and Networks (ICCCN), 2019, pp. 1-9.
[11] Haiyang Jiang, et al. "Scalable High-Performance Parallel Design for Network Intrusion Detection Systems on Many-Core Processors", Proceedings of the Ninth ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2013, pp. 137-146.
[12] Haiyang Jiang, et al. "Load Balancing by Ruleset Partition for Parallel IDS on Multi-Core Processors", 22th International Conference on Computer Communication and Networks (ICCCN), 2013, pp. 1–8.
[13] Haiyang Jiang, et al. "Efficient Fingerprint Extraction for High Performance Intrusion Detection System", IEEE Symposium on Computers and Communications (ISCC), 2013, pp. 179-184.
[14] Haiyang Jiang, et al. "Exploring and Enhancing the Performance of Parallel IDS on Multi-Core Processors", IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011, pp. 673-680.
[15] Haiyang Jiang, et al. "Exploring the Performance of Software Pipeline IDS on Multi-core Processors", 14th Chinese Fault Tolerant Computing Conference
[16] Haiyang Jiang, Hongxiang Wang, and Yuefeng Ji. Comparison of EDC-TX and EDC-RX performance with different pulse formats in optical system at 10G b/s[C]//Optical Transmission, Switching, and Subsystems V. SPIE, 2007, 6783: 1142-1149.
[17] Haiyang Jiang, Hongxiang Wang, and Yuefeng Ji. "Experimental investigation on aggregation amplification of TCP throughput in OBS mesh network testbed", In Optical Transmission, Switching, and Subsystems V, vol. 6783, pp. 412-419. SPIE, 2007.
专利:
[1] 用于虚拟化系统的方法及虚拟化系统,CN109901909B
[2] 一种虚拟化系统及其数据交换方法,CN109857517B
[3] 一种虚拟转发设备的转发限速方法及系统,CN112671667B
[4] 基于虚拟交换机中流表结构隔离的流表查询方法及系统,CN112953927A
[5] 一种用于数据包检测的并行模式匹配方法,CN112506789A
[6] 一种网络流量实时索引方法及系统,CN113139100A
[7] 一种dga型僵尸网络的检测方法、介质和电子设备,CN111628970A
[8] 一种网络攻击检测中指纹库的提取方法和系统,CN103324886A
[9] 一种sdn多模块部署规则冲突的处理方法,CN105207912B
[10] 一种基于漏扫结果的入侵防御优化方法及装置,CN115580428A
[11] 一种恶意url阻断方法,CN115270120A
[12] 一种基于规则匹配的入侵防御系统自适应保护方法及装置,CN115987588A
[13] 一种数据库表结构及网络流量检索方法,CN115114499A
[14] 一种自动适配硬件资源的nta设备配置策略方法,CN114138482A
[15] 一种记录与拾取过程分离的入侵检测系统的恶意载荷标注方法,CN114254309A
[16] 一种基于Hadoop平台的网络主机漏洞扫描新方法,CN115118519A
[17] 一种基于时间窗的域名缓存替换方法和系统,CN115967746A
[18] 一种基于爬虫技术完善安全规则库的方法,CN114238991A
[19] 一种基于用户策略的网络数据包存储装置及方法,CN114047881A
[20] 一种基于Antv的自定义可视化拓扑图的实现方法,CN114048110A
[21] 一种基于vue框架的自定义数据可视化大屏实现方法,CN114048111A
[22] 一种用于域名分类的分类模型构建方法、分类系统,CN116502153A
[23] 一种dpdk实时流量的cpu资源动态控制方法,CN117978694A
[24] 一种网络流量存储并行处理服务架构及其实现方法,CN116962326A
[25] 一种攻击流量的生成方法及系统,CN116488928A
[26] 基于HashTrie和Bitmap的网络流量索引优化策略的方法及系统,CN117407564A
[27] 基于cpu负载与数据包压缩效率的动态存储方法及系统,CN117857391A
[28] 基于网络数据包属性值长短特征的数据包索引与检索方法,CN117435912A
科研项目:
[1] 虚拟网络高性能流量镜像技术:深信服公司合作,解决云数据中心东西向流量采集以及云数据中心的网络安全问题,项目负责人
[2] 网络流量深度分析技术:北京北信恒公司合作,对云网络流量进行深度分析和威胁检测,项目负责人
[3] Virtual Switch的安全隔离机制研究:阿里巴巴公司合作,解决阿里云数据中心的网络虚拟化架构造成的数据隔离性问题,项目负责人
[4] 流量采集和流量特征分析技术合作:华为公司合作,基于AI方法,对互联网流量业务进行识别和威胁检测,项目负责人
[5] 基于共治链的高效域名解析算法与机制:重点研发课题,课题负责人
[6] 多模态边缘网络安全:重点研发子课题,研究边缘接入的网络安全、网络可靠性问题,子课题负责人
[7] 递归解析服务器威胁发现与安全状况分析:重点研发子课题,研究DNS系统的安全性问题,子课题负责人
[8] 网络功能虚拟化可扩展性研究:自然科学基金青年基金,研究网络功能虚拟化的扩展性问题,项目负责人
[9] 5G网络切片技术研发、标准化与验证:国家科技重大专项课题,解决5G网络核心网的安全性、可靠性问题,课题负责人
[10] CENI:China Environment for Network Innovations,建设国家级网络实验和创新平台,旨在为未来网络技术的研究和开发提供大规模的实验环境,参与人员
获奖及荣誉:
[1] 计算所优秀员工,2021年
[2] 支持服务定制化的高性能网络功能虚拟化平台,中国通信学会科学技术奖,三等奖,所内第二完成人,2019年
[3] 支持服务定制化的高性能网络功能虚拟化平台,江苏信息通信行业科学技术奖,一等奖,所内第二完成人,2019年
[4] 阿里巴巴创新研究计划获奖科学家,2017年
姜海洋 副研究员
研究方向:
所属部门:网络技术研究中心
导师类别:硕导计算机系统结构
联系方式:jianghaiyang@ict.ac.cn
个人网页: