臧天宁  

中国科学院信息工程研究所  正高级工程师  博士生导师

中国科学院大学  岗位教授 

电子邮件: zangtianning@iie.ac.cn
通信地址: 北京市海淀区树村路19号
邮政编码: 100084

研究领域

网络空间安全

招生信息

   
招生专业
083900-网络空间安全
招生方向
网络安全与人工智能技术、网络安全与大数据分析
威胁检测与信息对抗、安全态势感知技术

教育背景

2006-09--2011-10   中国科学院计算技术研究所/哈尔滨工程大学   硕博连读/工学博士
学历
研究生

学位
工学博士

工作经历

   
工作简历
2019-10~现在, 中国科学院信息工程研究所, 正高级工程师(正研级)
2013-10~2019-09,中国科学院信息工程研究所, 高级工程师(副研级)
2012-04~2013-09,中国科学院信息工程研究所, 助理研究员

教授课程

域名系统安全
计算机网络安全技术

专利与奖励

专利成果
[1] 云晓春, 张永铮, 王曦, 常鹏, 王勇, 臧天宁, 李高超, 薛晨, 吴震. 网络设备监控方法及系统. CN: CN103516555A, 2014-01-15.

[2] 云晓春, 陈训逊, 王东安, 张晓明, 张永铮, 王曦, 杜飞, 王勇, 臧天宁. 一种面向大规模包分类规则集的规则冲突检测方法及系统. CN: CN103516550A, 2014-01-15.

[3] 云晓春, 李书豪, 张永铮, 臧天宁, 王一鹏. 一种恶意代码捕获方法及系统. CN: CN102833240A, 2012-12-19.

出版信息

   
部分发表论文
[1] 李想, 臧天宁. Facing Unknown: Open-World Encrypted Traffic Classification Based on Contrastive Pre-Training. 2023 IEEE Symposium on Computers and Communications (ISCC)[J]. 2023, [2] 臧天宁, 李盛葆. FusionTC: Encrypted App Traffic Classification Using Decision- Level Multimodal Fusion Learning of Flow Sequence. Wireless Communications and Mobile Computing[J]. 2023, [3] 蒋松浩, 臧天宁. Explainable Text Classification via Attentiveand Targeted Mixing Data Augmentation. the 32nd International Joint Conferenceon Artificial Intelligence[J]. 2023, [4] 王中华, 徐杰, 韩健, 臧天宁. 基于卷积神经网络的恶意区块链域名检测方法. 信息安全研究[J]. 2022, 8(8): 760-767, http://lib.cqvip.com/Qikan/Article/Detail?id=7107698812.
[5] zeng yuwei, Zang, Tianning. Hidden Path: Understanding the Intermediary in Malicious Redirections. IEEE Transactions on Information Forensics and Security[J]. 2022, [6] Zang Tianning. Winding Path:Characterizing the Malicious Redirection in Squatting Domain Names. Passive and Active Measurement Conference 2021null. 2021, [7] Chen, Yige, Zang, Tianning. Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering. 17th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing[J]. 2021, [8] Zang Tianning. Mobile Encrypted Traffic Classification Based on Message Type Inference. 17th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharingnull. 2021, [9] Chen, Yige, Zang, Tianning. Incremental Learning for Mobile Encrypted Traffic Classification. IEEE International Conference on Communications/2021null. 2021, [10] Zeng, Yuwei, Yun, Xiaochun, Chen, Xunxun, Li, Boquan, Tsang, Haiwei, Wang, Yipeng, Zang, Tianning, Zhang, Yongzheng. Finding disposable domain names: A linguistics-based stacking approach?. COMPUTER NETWORKS[J]. 2021, 184: http://dx.doi.org/10.1016/j.comnet.2020.107642.
[11] Yun, Xiaochun, Huang, Ji, Wang, Yipeng, Zang, Tianning, Zhou, Yuan, Zhang, Yongzheng. Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 15: 2225-2240, http://dx.doi.org/10.1109/TIFS.2019.2960647.
[12] Zhao, Chen, zhang yongzheng, Zang Tianning. A Multi-feature-based Approach to Malicious Domain Name Identification from DNS Traffic. 27th International Conference on Telecommunications (ICT)null. 2020, [13] Liang, Zhizhou, Zang, Tianning, Zeng, Yuwei, IEEE. MalPortrait: Sketch Malicious Domain Portraits Based on Passive DNS Data. 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC)[J]. 2020, [14] Zang Tianning. Leopard: Understanding the Threat of Blockchain Domain Name Based Malware. Passive and Active Measurement Conference 2020. 2020, [15] Zang Tianning. Nemesis: Detecting Algorithmically Generated Domains with An LSTM Language Model. CollaborateCom 2019. 2019, [16] Zeng, Yuwei, Zang, Tianning, Zhang, Yongzheng, Chen, Xunxun, Wang, YiPeng, IEEE. A Comprehensive Measurement Study of Domain-squatting Abuse. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)[J]. 2019, [17] Zeng, Yuwei, Zhang, Yongzheng, Zang, Tianning, Chen, Xunxun, Wang, Yipeng, IEEE Comp Soc. A Linguistics-based Stacking Approach to Disposable Domains Detection. 2019 IEEE 27TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP)null. 2019, [18] Zang Tianning. Pontus: A Linguistics-based DGA Detection System. IEEE GLOBECOM 2019. 2019, [19] Zheng, Chaoyi, Qiang, Qian, Zang, Tianning, Chao, Wenhan, Zhou, Yuan, IEEE. Themis: A Novel Detection approach for detecting mixed Algorithmically Generated Domains. 2019 15TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2019)null. 2019, 259-264, http://dx.doi.org/10.1109/MSN48538.2019.00057.
[20] Chen, Yige, Zang, Tianning, Zhang, Yongzheng, Zhou, Yuan, Wang, Yipeng, IEEE Comp Soc. Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach. 2019 IEEE 27TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (IEEE ICNP)[J]. 2019, [21] Zhao, Chen, zhang yongzheng, Zang Tianning. A Stacking Approach to Objectionable-Related Domain Names Identification by Passive DNS Traffic . CollaborateCom 2018[J]. 2018, [22] Yu, Miao, Zhang, Yongzheng, Zang, Tianning, Wang, Yipeng, Wang, Yijing. Information Propagation Prediction Based on Key Users Authentication in Microblogging. SECURITY AND COMMUNICATION NETWORKS[J]. 2018, https://doaj.org/article/952e73fb210941989512383baa106929.
[23] Huang Ji, Wang Pei, Zang Tianning, Qiang Qian, Wang Yipeng, Yu Miao, IEEE. Detecting Domain Generation Algorithms With Convolutional Neural Language Models. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE)[J]. 2018, 1360-1367, [24] Wang, YiPeng, Yun, Xiaochun, Zhang, Yongzheng, Chen, Liwei, Zang, Tianning. Rethinking robust and accurate application protocol identification. COMPUTER NETWORKS[J]. 2017, 129: 64-78, http://dx.doi.org/10.1016/j.comnet.2017.09.006.
[25] Wang Jinxia, Xu Xiaoyan, Yang Min, Zang Tianning, IEEE. IP Geolocation Technology Research Based on Network Measurement. PROCEEDINGSOF2016SIXTHINTERNATIONALCONFERENCEONINSTRUMENTATIONMEASUREMENTCOMPUTERCOMMUNICATIONANDCONTROLIMCCC2016null. 2016, 892-897, [26] Zhang Lulu, Zhang Yongzheng, Zang Tianning, Tian J, Jing J, Srivatsa M. Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering Scheme. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT Inull. 2015, 152: 454-462, [27] 臧天宁, 云晓春, 张永铮, 门朝光. 僵尸网络关系云模型分析算法. 武汉大学学报:信息科学版[J]. 2012, 37(2): 247-251, http://lib.cqvip.com/Qikan/Article/Detail?id=40817070.
[28] Wang, Yongjian, Xu, Junfeng, Li, D, Yang, F, Ren, F, Wang, W. COOPERATIVE WORK SYSTEMS FOR THE SECURITY OF DIGITAL COMPUTING INFRASTRUCTURE COOPERATIVE DETECTION SYSTEMS FOR BOTNET DETECTION. 2012IEEE2NDINTERNATIONALCONFERENCEONCLOUDCOMPUTINGANDINTELLIGENTSYSTEMSCCISVOLS13null. 2012, 674-680, [29] 臧天宁, 云晓春, 张永铮, 门朝光, 孙建亮. 网络设备协同联动模型. 计算机学报[J]. 2011, 34(2): 216-228, http://lib.cqvip.com/Qikan/Article/Detail?id=36835621.
[30] Yin Lihua. Andbot: Towards Advanced Mobile Botnets. Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats. 2011, [31] 臧天宁, 云晓春, 张永铮, 门朝光, 崔翔. 基于通信特征和D-S证据理论分析僵尸网络相似度. 通信学报[J]. 2011, 32(4): 66-76, http://lib.cqvip.com/Qikan/Article/Detail?id=37426756.
[32] Zang Tianning. A Survey of Alert Fusion Techniques for Security Incident. 2008, 

科研活动