D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 51 Citations 15,486 140 World Ranking 3462 National Ranking 1781

Research.com Recognitions

Awards & Achievements

2020 - IEEE Fellow For contributions to malware detection and security of next generation networks

2019 - ACM Distinguished Member

2014 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

His main research concerns Computer security, Computer network, Software-defined networking, Botnet and Distributed computing. His work carried out in the field of Computer security brings together such families of science as Android and Dialog box. His Computer network study focuses on Network security in particular.

In Software-defined networking, Guofei Gu works on issues like Forwarding plane, which are connected to Network operations center, Bottleneck, Asynchronous communication and Scalability. As a part of the same scientific family, he mostly works in the field of Distributed computing, focusing on Denial-of-service attack and, on occasion, Rate limiting, Network security policy, Flooding, Scale-free network and Machine learning. Guofei Gu usually deals with Malware and limits it to topics linked to Evasion and World Wide Web.

His most cited work include:

  • BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection (991 citations)
  • BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic (705 citations)
  • BotHunter: detecting malware infection through IDS-driven dialog correlation (681 citations)

What are the main themes of his work throughout his whole career to date?

Guofei Gu mostly deals with Computer security, Computer network, Malware, World Wide Web and Software-defined networking. His study focuses on the intersection of Computer security and fields such as Android with connections in the field of Vetting. He works mostly in the field of Computer network, limiting it down to concerns involving Distributed computing and, occasionally, Intrusion detection system.

Guofei Gu focuses mostly in the field of Malware, narrowing it down to topics relating to The Internet and, in certain cases, Scalability. His Software-defined networking research integrates issues from Forwarding plane, Denial-of-service attack and Testbed. He has included themes like Mariposa botnet and Cutwail botnet in his Rustock botnet study.

He most often published in these fields:

  • Computer security (50.71%)
  • Computer network (25.71%)
  • Malware (22.14%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer network (25.71%)
  • Computer security (50.71%)
  • Denial-of-service attack (5.00%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer network, Computer security, Denial-of-service attack, Software-defined networking and Forwarding plane. His studies in Network packet and Node are all subfields of Computer network research. His research ties Web application and Computer security together.

Guofei Gu has researched Denial-of-service attack in several fields, including Middlebox, Modular design, Packet processing and Botnet. His work on OpenFlow as part of his general Software-defined networking study is frequently connected to Control theory and Reflection, thereby bridging the divide between different branches of science. His Forwarding plane study incorporates themes from Network architecture, Routing control plane, Host and Data dependency.

Between 2019 and 2021, his most popular works were:

  • Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. (14 citations)
  • SODA: A Generic Online Detection Framework for Smart Contracts. (12 citations)
  • Unexpected Data Dependency Creation and Chaining: A New Attack to SDN (3 citations)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection

Guofei Gu;Roberto Perdisci;Junjie Zhang;Wenke Lee.
usenix security symposium (2008)

1544 Citations

BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection

Guofei Gu;Roberto Perdisci;Junjie Zhang;Wenke Lee.
usenix security symposium (2008)

1544 Citations

BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic

Guofei Gu;Junjie Zhang;Wenke Lee.
network and distributed system security symposium (2008)

1192 Citations

BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic

Guofei Gu;Junjie Zhang;Wenke Lee.
network and distributed system security symposium (2008)

1192 Citations

BotHunter: detecting malware infection through IDS-driven dialog correlation

Guofei Gu;Phillip Porras;Vinod Yegneswaran;Martin Fong.
usenix security symposium (2007)

1151 Citations

BotHunter: detecting malware infection through IDS-driven dialog correlation

Guofei Gu;Phillip Porras;Vinod Yegneswaran;Martin Fong.
usenix security symposium (2007)

1151 Citations

FRESCO: Modular Composable Security Services for Software-Defined Networks

Seung Won Shin;Phillip Porras;Vinod Yegneswara;Martin Fong.
network and distributed system security symposium (2013)

812 Citations

FRESCO: Modular Composable Security Services for Software-Defined Networks

Seung Won Shin;Phillip Porras;Vinod Yegneswara;Martin Fong.
network and distributed system security symposium (2013)

812 Citations

A security enforcement kernel for OpenFlow networks

Philip Porras;Seungwon Shin;Vinod Yegneswaran;Martin Fong.
acm special interest group on data communication (2012)

738 Citations

A security enforcement kernel for OpenFlow networks

Philip Porras;Seungwon Shin;Vinod Yegneswaran;Martin Fong.
acm special interest group on data communication (2012)

738 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Guofei Gu

Gianluca Stringhini

Gianluca Stringhini

Boston University

Publications: 32

Mauro Conti

Mauro Conti

University of Padua

Publications: 32

Xiapu Luo

Xiapu Luo

Hong Kong Polytechnic University

Publications: 28

Christopher Kruegel

Christopher Kruegel

University of California, Santa Barbara

Publications: 28

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 27

Yan Chen

Yan Chen

Northwestern University

Publications: 27

Yang Liu

Yang Liu

Nanyang Technological University

Publications: 26

Vijay Varadharajan

Vijay Varadharajan

University of Newcastle Australia

Publications: 26

Mourad Debbabi

Mourad Debbabi

Concordia University

Publications: 26

Roberto Perdisci

Roberto Perdisci

University of Georgia

Publications: 24

Yang Xiang

Yang Xiang

Swinburne University of Technology

Publications: 24

Giovanni Vigna

Giovanni Vigna

University of California, Santa Barbara

Publications: 22

Shui Yu

Shui Yu

University of Technology Sydney

Publications: 22

Gail-Joon Ahn

Gail-Joon Ahn

Arizona State University

Publications: 21

Shouhuai Xu

Shouhuai Xu

University of Colorado Colorado Springs

Publications: 21

Danfeng Yao

Danfeng Yao

Virginia Tech

Publications: 21

Trending Scientists

Stefan Voß

Stefan Voß

Universität Hamburg

Takao Kato

Takao Kato

Colgate University

Changick Kim

Changick Kim

Korea Advanced Institute of Science and Technology

Manfred Geiger

Manfred Geiger

University of Erlangen-Nuremberg

Wen Li

Wen Li

University of Electronic Science and Technology of China

Calum J. Drummond

Calum J. Drummond

RMIT University

Thomas W. Glover

Thomas W. Glover

University of Michigan–Ann Arbor

Guus Koch

Guus Koch

Wageningen University & Research

Frank J. Pazzaglia

Frank J. Pazzaglia

Lehigh University

Hua Zhang

Hua Zhang

Tongji University

Joanna Joiner

Joanna Joiner

Goddard Space Flight Center

Michael A. Matar

Michael A. Matar

Ben-Gurion University of the Negev

Lucilla Poston

Lucilla Poston

King's College London

George F. Dreher

George F. Dreher

Indiana University

Michael W. Beets

Michael W. Beets

University of South Carolina

Jennifer D. Allen

Jennifer D. Allen

Tufts University

Something went wrong. Please try again later.