Current Location:homepage  Research
Research Center of Computer Network and Information Security Technology
Editor:贾岩  Updated:2016-01-07  Views:324

1. Mission

In recent years, cyber security has been regarded as a national development strategy by all countries in the world. With the increasing reliance on the Internet and information systems, the threats in cyber security are becoming more and more serious. With the rapid development of network technologies and applications, the information network shows several characteristics, including information heterogeneity, network isomerization, data mass, measure scale dynamic, etc. The security situation of the cyber space is becoming increasingly complicated, and even threatens the national security and social stability directly.

To tackle primary cyber security challengese.g.,easy to abuse Internet resources, hard to detect network attacks, difficult to track security events, our research group focuses on Internet infrastructure security protection, network security events monitoring, newfashioned cryptography and so on. We strive to build HIT into Domestic first-class cyber security base for scientific research, talent cultivation and academic communication.

2. Overview

Information security is apractice aiming to defend information from unauthorized access and use, disclosure, disruption, modification, perusal, inspection, recording or destruction, and to develop methods to preserve confidentiality, integrity and availability of information. As a multidisciplinary area, it also involves authenticity, accountability, non-repudiation and reliability in the view of information system. Also, information countermeasure is afield that develops methods and tools, and deploys a set of security services to reduce the threat, vulnerability or attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective actions can be taken.

The research work of the school in this field is the investigation of information security, including data privacy in cloud security, Internet of Things’ security, DNS security, and social network analysis, information-centric networking architecture, multimedia security method, QKD post-processing method, the development of QKD system and hiding communication system based on the steganography. The main achievements include a new self-governed testbed for DNS Resolution, a set of tools for social network analysis, a high speed single photon QKD post-processing system, a hiding communicating system and a series of tools to protect visual media, which can enhance the advancement of this field as a whole.

There are 4 professors, 5 associate professors and 8 lecturers working in this field, among whom 4 are doctoral supervisors and 6 are master supervisors. Currently, there are more than 20 doctoral students and 30 master students studying in this research field.

Leading professors include: Prof. Binxing Fang, Prof. Hongli Zhang, Prof. Qiong Li, Prof. Xiangzhan Yu, Associate Prof. Jianhong Zhai, Associate Prof. Hui He, Associate Prof. Qi Han, Associate Prof. Zhihong Tian, and Associate Prof. Yu Zhang.

In the past four years, 2011-2015, the faculty members in this field have been granted more than 40 research projects, among which 10 are funded by National Natural Science Foundation of China (NSFC), 1 funded by National Program on Key Basic Research Project (973 Program), 10 funded by the National High-tech R&D Program of China (863 Program). 1 Third Prize of Military Science Technology Progress Award has been won. More than 500 research papers have been published in international and domestic academic conferences and journals, including more than 50 journal papers and more than 150 papers indexed by SCI. Besides, at least 6 textbooks and monographs have been published and over 50 patents or software copyrights have been granted.

55 Ph.D. students and more than 300 master students have graduated from this research field. The outstanding alumni include Dr. Xiaojun Jing, CEO of Surfilter; Dr. Yuejin Du, a deputy chief of Risk Officer of Alibaba Group; Dr. Xiaochun Yun, a deputy director of National Computer Network Emergency Response Technical Team /Coordination Center of China (CNCERT/CC); Dr. Xinran Liu, a deputy director of National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC).

The detailed information of our research work in this field can be found in and

3. Research Topics

  • Information-centric networking: Designing scalable and efficient routing and forwarding schemes.

  • Self-governed architecture for DNS: Maintaining the logic structure with a single root, and constructing the DNS system structure with multiple roots.

  • Internet of things: Building the architecture within context-aware search engines and recommender systems for a physical world.

  • Cloud computing security: Protecting the security and privacy of outsourced data in cloud, and guaranteeing quality-of-service of users.

  • Social network models and theories: Identifying information incidence relation, adaptive role recognition for social network and tracking the source of the event.

  • Post-processing of quantum cryptography: Targeting to optimize the efficiency and speed of post-processing of quantum key distribution.

  • Magnetic signal processing:Targeting to process high-precision magnetic signals, including aeromagnetic compensation, magnetic abnormal detection and magnetism navigation.

  • Multimedia security:Protecting the authenticity and integrity of image, audio and video by means of digital watermarking, robust hashing and multimedia forensics.

  • Quantum image security: Targeting the quantum image representation & processing, quantum image based information hiding, and quantum image cryptography.

4. The Faculty

Prof. Bingxin Fang

Personal website:

He is an academician of Chinese Academy of Engineering, a member of the High-level Advisory Council of the Secretariat of the World Internet Conference Organizing Committee and the vice chairman of China Institute of Communications and the ex-president of Beijing University of Posts and Telecommunications (2007/12 – 2013/6).

He is also a member of the expert committee for Information Security Major Projects of National Natural Science Foundation of China, and of the expert committee for Information Security field of National High-tech Research and Development (National 863 program).

His research interests cover the theories and practices of network and information security. Especially, he focuses on the architecture of information security, network protocol analysis, IPv6, computer virus. In a theoretical respect, he defines a unified formal concept of information security referring to physical security, runtime security, data security and content security while proposing the computation on the attributes of information security.

He has presided and accomplished more than 20 projects, including National Natural Science Foundation of China (NSFC), National Program on Key Basic Research Project (973 Program), National High-tech R&D Program of China (863 Program), Program of Chinese Academy of Engineering, the Ph.D. Programs Foundation of Ministry of Education of China. He has published 1 book and more than 200 papers, and supervised more than 40 doctoral students. He has obtained 1 First Prize of National Science and Technology Progress Award, 3 Second Prize of Ministerial National Science and Technology Progress Award, and 6 Third Prize of Ministerial National Science and Technology Progress Award.

Prof. Hongli Zhang


Personal website:

She is a professor and an assistant dean of the School of Computer Science and Technology in HIT, a deputy director of State Key Laboratory for Computer Information Content Security and Technical Committee of Security National Engineering Laboratory on computer information content security technologies, a member of Technical Committee of National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC), Ministry of Education Teaching Committee on Information Security and Chinese Computer Association.

Her research interests cover network and information security, network measurement and social network. In the network and information security field, her research focuses on anomaly detection of network traffic, peer-to-peer security, protection of data security and privacy in cloud computing and malware detection in virtual machine.

She has presided and accomplished more than 20 projects, including National Natural Science Foundation of China (NSFC), National High-tech R&D Program of China (863 Program) and National 242 Program. She published more than 90 papers, over 59 of which are indexed by SCI, and also has been granted more than 10 patents in China. She has obtained 1 First Prize Science and Technology Progress Award of Ministry of Education, 2 Second Prize of Ministerial Science and Technology Progress Awards.

Other researchers

  • Prof. Xiangzhan Yu: Working on network and information security, security of Internet of Things (IoTs);

  • Associate Prof. Jianhong Zhai: Working on green computing in cloud;

  • Associate Prof. Hui He: Working on network security situation awareness and intrusion detection system;

  • Associate Prof. Yu Zhang: Working on information-centric networking and DNS security.

5 .Selected Publications

The faculty members of this research field have published their innovative findings on top journals such as IEEE Journal on Selected Areas in Communications, Computer Communications, and Security and Communication Networks, Quantum Information Processing, Forensic Science International, Signal Processing, Quantum Information & Computation, and IEEE Geoscience and Remote Sensing Letters, and made major contributions to top conferences such as INFOCOM, PAM, IWQoS, GLOBECOM and ICC.

5.1 Selected Journal Papers

  1. Hongli Zhang, Lin Ye, Jiantao Shi, Xiaojiang Du, Hsiao-Hwa Chen. Preventing Piracy Content Propagation in Peer-to-Peer Networks. IEEE Journal on Selected Areas in Communications, 2013, 31(9): 105-114. (SCI IF:3.453)

  2. Haining Yu, Hongli Zhang, Binxing Fang, Xiangzhan Yu. A Large Scale Code Resolution Service Network in the Internet of Things. Sensors (Basel). 2012, 12(11): 15206-15243. (SCI IF: 2.245)

  3. Hongli Zhang, Gang Lu, Mahmoud T. Qassrawi, Yu Zhang, Xiangzhan Yu. Feature selection for optimizing traffic classification. Computer Communications. 2012, 35(12): 1457-1471. (SCI IF:1.695)

  4. Qiong Li, Dan Le, Haokun Mao, Xiamu NIU, Tian Liu, Hong Guo. Study on Error Reconciliation in Quantum Key Distribution. Quantum Information & Computation, 2014, 14(13-14): 1117-1135. (SCI IF: 1.646)

  5. Yibao Bao, Lihua Yin, Binxing Fang. A Novel Logic-based Automatic Approach to Constructing Compliant Security Policies. Science China-Information Sciences, 2012, 55(1):149-164.

  6. Chenye Qiu, Chunlu Wang, Binxing Fang, Xingquan Zuo. A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis. Applied Artificial Intelligence: An International Journal, 2014, 28(6):555-576.

5.2 Selected Top Conference Papers

  1. Zhigang Zhou, Hongli Zhang, Xiaojiang Du, Panpan Li, Xiangzhan Yu. Prometheus: Privacy-aware Data Retrieval on Hybrid Cloud. Proceedings of the 32nd IEEE Conference on Computer Communications (INFOCOM 2013), 2013.4.14-2013.4.19, Turin Italy, 2643-2651.

  2. Yu Zhang, Ricardo Oliveira, Hongli Zhang, Lixia Zhang. Quantifying the Pitfalls of Traceroute in AS Connectivity Inference. Proceedings of the 11th international conference on Passive and active measurement (PAM 2010), 2010.4.7-2010.4.9, Zurich, Switzerland, 91-100.

  3. Lin Ye, Hongli Zhang, Xiaojiang Du. Modeling Leechers Attack in BitTorrent. Proceedings of 2014 IEEE Global Communications Conference (GLOBECOM 2014), 2014.10.7-2014.10.11, Austin USA, 681-685. (Best Paper Award).

  4. Lizhi Peng, Hongli Zhang, Bo Yang, Yuehui Chen, Mahmoud T. Qassrawi, Gang Lu. Traffic Identification Using Flexible Neural Trees. Proceedings of 18th International Workshop on Quality of Service (IWQoS 2010), 2010.6.16-2010.6.18, Beijing China, 1-5.

  5. Qiang Zhang, Hongli Zhang, Xiaojiang Du, Zhigang Zhou, Shen Su, Rui Jin. Contention-based Adaptive Position Update for Intermittently Connected VANETs. Proceedings of 2014 IEEE Global Communications Conference (GLOBECOM 2014). 2014.10.7- 2014.10.11, Austin USA, 51-56.

  6. Zhigang Zhou, Hongli Zhang, Qiang Zhang, Yang Xu, Panpan Li. Privacy- Preserving Granular Data Retrieval Indexes for Outsourced Cloud Data. Proceedings of 2014 IEEE Global Communications Conference (GLOBECOM 2014). 2014.10.7-2014.10.11, Austin USA, 601-606.

  7. Hongli Zhang, Zhigang Zhou, Xiaojiang Du, Panpan Li, Xiangzhan Yu. Practical and Privacy-assured Data Indexes for Outsourced Cloud Data. Proceedings of 2013 IEEE Global Communications Conference (GLOBECOM 2013), 2013.12.9-2013.12.13, Atlanta USA, 671-676.

  8. Hongli Zhang, Lin Ye, Xiaojiang Du, Mohsen Guizani. Protecting Private Cloud Located within Public Cloud. Proceedings of 2013 IEEE Global Communications Conference (GLOBECOM 2013), 2013.12.9-2013.12.13, Atlanta USA, 677-681.

  9. Juan Chen, Hongli Zhang, Xiaojiang Du, Binxing Fang, Yan Liu, Haining Yu. Base Station Location Protection in Wireless Sensor Networks: Attacks and Defense. Proceedings of 2012 IEEE International Conference on Communications (ICC 2012). 2012.6.10 -2012.6.15, Ottawa Canada, 554-559.

  10. Juan Chen, Hongli Zhang, Binxing Fang, Xiaojiang Du, Lihua Yin, Xiangzhan Yu. Towards Efficient Anonymous Communications in Sensor Networks. Proceedings of 2011 IEEE Global Communications Conference (GLOBECOM 2011). 2011.12.5-2011.12.9,Houston USA, 1-5.

6. Selected Research Projects

  1. National Natural Science Foundation of China (NSFC), Research Problems on Carving and Tamper Detection of Fragmented Multimedia Evidence for Forensic Investigation (Grant No. 61361166006). $11M, 2014.1-2017.12.

    It is the main research in the disk storage and new storage devices (mobile phones, flash memory), and the P2P network packets of the multimedia evidence carving complex issues as well as multimedia evidence tampering detection problem, on this basis, collaborative research multimedia evidence carving complex and tamper detection inherent relationship mapping problem, and mutual cooperation in digital forensics investigation, building a complete chain of evidence from the bottom of the original fragments of evidence to the evidence of the application layer media content.

  2. National Natural Science Foundation of China (NSFC), Study on Key Problems in Post-Processing System of Single Photon Quantum Key Distribution (Grant No. 61471141). $12M, 2015. 1-2018.12.

    This project focuses on the construction of an overall mathematical model of the QKD post processing system. Guided by the model, the following modules have been studied: the optimal sifting module of low interaction information amount, the error correction module of balanced efficiency and resource consumption, and the unconditional secure authentication module of low key consumption. This research makes a significant contribution to constructing a secure and efficient single photon QKD system.

  3. National Natural Science Foundation of China (NSFC), Research on Scalable Named Data Routing in Information-Centric Networking (Grant No. 61202457). $4M, 2013. 1-2015.12.

    This project focuses on the scalability problem of named data routing due to the massive location-independent namespace in Information-Centric Network­ing, which is a candidate for the future Internet architecture. This research achieves both efficient and scalable named data routing.

7 .Social Contribution

Since 2012, our team has addressed the incompatibility between the system structure of the single root in the Internet domain name system (DNS) and the governance structure of the equal sovereignty of the Internet. We developed an autonomous and trusted architecture of DNS root resolution, namely Inter-root. The key idea behind Inter-root is to interconnect and exchange root zone file among national root servers which are deployed and operated by different nations. An Inter-root experiment system spanning in four cities of Harbin, Beijing, Changsha, and Weihai have formed a strategic countermeasure against the abuse and failure of current DNS root servers. The experiment system has been supported positively and tested through the international collaboration.

Since 2012, the team has developed systems for large-scale network intrusion monitoring and Internet public opinion monitoring in response to the need for cyber anti-terrorism and cybersecurity defense. It has been successfully applied to Internet emergency response and network intrusion monitoring, etc. Those systems have played an important role in the past.