杨家海教授
个人介绍

姓名:杨家海

职称:教授

电话:+86 10 62783492

邮箱:yang@cernet.edu.cn

实验室主页:http://nmgroup.tsinghua.edu.cn

详细个人信息:http://nmgroup.tsinghua.edu.cn/yjh/

教育背景

工学学士 (计算机应用), 北京工商大学, 中国, 1989

工学硕士 (计算机系统结构), 清华大学, 中国, 1992

工学博士 (计算机系统结构), 清华大学, 中国, 2003

社会兼职

John Wiley & Sons International Journal of Network Management(IJNM)期刊(SCI检索),编委,2012~

IEEE Transactions on Network and Service Management(TNSM) (SCI检索)期刊,编委,2014~

《计算机科学》期刊,编委,2019~

《信息对抗技术》期刊,编委,2021~

《网络空间安全》期刊,副主任,2019~

中国计算机学会高级会员,开放系统专业委员会副主任委员(2007-2015)、分布式计算与系统专业委员会委员;中国指挥与控制学会网络空间测绘专委会副主任委员(2023~)

北京市计算机学会理事(2008~)

国际电气和电子工程师协会IEEE高级会员、美国计算机协会ACM会员

此外,还担任国家科学技术奖励评审委员、教育部科学技术奖励评审委员、北京市科技奖励评审专家、国家“863”项目评审专家、科技部国际合作项目评审专家等。

研究领域

互联网络运行与管理

网络测量与网络空间安全

网络空间测绘与态势感知

云计算、虚拟化及资源管理调度

IPv6及新一代互联网体系结构

研究概况

       近年来,我主要从事互联网络行为测量、网络空间安全态势感知和网络空间测绘等方面的科研和教学工作:

1、网络全息测量和网络行为学研究。真实地了解甚至预测网络的行为,对于网络的运行和未来互联网的演进都至关重要,但网络的真实特性和导致这一特性的真实原因往往很难通过某一方面的数据来判断,很多问题都是相互关联的,对于互联网这样的复杂巨系统更是如此,因此了解网络必须有全面的信息。不仅要研究通常的流量数据、SNMP信息、路由信息和性能信息,而且需要全面考查用户行为信息、应用系统信息、设备和系统日志、IP和用户信息和底层通信系统信息。在全面研究全息测量本身的理论和关键技术的基础上,研究网络的动态行为,动力学特征,网络行为的变化规律等。

2、网络安全和安全态势感知。互联网络已深刻地融入到人类生产生活的方方面面,迅疾地改变着人们的生活形态甚至生存状态;另一方面,互联网络又正面临着越来越多的安全威胁,网络攻击事件层出不穷,且愈演愈烈,导致的经济损失规模也越来越大,年损失达几千亿美元。网络空间安全问题的重要性日益凸显,我们将研究基于测量的网络安全分析和建模技术;此外,网络空间安全的攻防将长期处于激烈的博弈状态,正所谓道高一尺魔高一丈,需要从网络全局出发研究立体式感知网络安全态势的各层面问题,包括网络微观态势感知、基于大数据和机器学习技术的多源异构数据分析与高效融合、宏观态势评估与威胁识别、安全攻击事件的追踪溯源等。

3、 网络空间测绘。网络空间被认为是人类继陆、海、空、天(太空)之外的第五疆域。当前世界各国在网络空间这个疆域正在进行着或明或暗的激烈博弈,然而,我们目前对于这个疆域的了解还非常少。因此,对网络空间进行全方位的测绘,构造第五疆域的地形地貌底图至关重要。面向IPv6的下一代互联网,由于其巨量的地址空间,相关的测绘研究将面临新的挑战。通过网络探测、采集、处理、分析等方式,获得网络空间基础设施、用户及服务等网络资产在网络空间、地理空间以及社会空间的相关属性,并将这些属性以逻辑图和地理信息图的形式绘制出来,形成一份动态、实时、可靠、有效的网络空间全息地图,将具有重大意义。

奖励与荣誉

(1) Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications, 网络安全顶级会议—计算机与通信安全国际会议(CCS2024)杰出技术成果奖,2024年10月

(2) Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation,ISOC和IRTF联合颁发的应用网络研究奖(ANRP),2024年3月

(3) 数智融合的一体化大规模云网络运维关键技术及系统,中国计算机学会CCF科技成果奖(技术发明类)二等奖,2023年10月

(4) 网络空间测绘—原理、技术与应用[专著],国家科学技术学术著作出版基金资助,2023年9月

(5) 国务院政府特殊津贴获得者,2023年5月

(6) 全球活跃IPv6地址探测方法体系及系统,首届IPv6技术应用创新大赛科教赛道暨第六届下一代互联网技术创新大赛高效创新组-网络关键技术类一等奖,及全国总决赛二等奖,2023年4月

(7) 清华大学第18届“良师益友”称号,清华大学,2023年4月

(8) Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels,网络安全顶级会议—网络与分布式系统安全国际会议(NDSS2023)杰出论文奖,2023年3月

(9) 面向云计算和互联网业务的IPv6商用部署技术研发及大规模应用,中国通信学会科技进步二等等;2019年10月

(10) The Okawa Foundation Research Grant(日本大川基金研究奖),On the Research of Efficient Malicious Domain Detection System, 2019年10月

(11) 基于形式化方法的互联网协议测试关键技术及其应用,中国电子学会技术发明一等奖,2016年12月。

(12) 互联网真实源地址验证关键技术研究及其应用,教育部技术发明一等奖,2013年1月

(13) 中国下一代互联网示范工程CNGI示范网络核心网CNGI-CERNET2/6IX,教育部科技进步一等奖,2007年1月。

(14) 高性能宽带信息网(3TNet)关键技术,上海市科技进步一等奖,2007年12月。

(15) 下一代互联网发展战略研究,国家发改委机关优秀研究成果奖三等奖,2004年4月。

(16) 计算机信息网络及其应用关键技术研究,2001中国高校科技进步一等奖。

(17) 中国教育和科研计算机网CERNET示范工程项目,1996年国家教委科技进步一等奖。

(18) 北京商品交易所计算机交易系统,1996年电子部科技进步二等奖,并获得1994年全国十大电子成果称号。

(19) COSA国产系统软件平台,1996年电子部八五科技攻关重大成果奖和科技进步特等奖。

学术成果

会议和期刊论文(部分)

[1] Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang. Centralized Network Utility Maximization with Accelerated Gradient Method. IEEE/ACM Transactions on Networking, 2025. DOI: 10.1109/TON.2025.3562283

[2] Hangtian Liu, Lei Zheng, Shuitao Gan, Chao Zhang, Zicong Gao, Hongqi Zhang, Yishun Zeng, Zhiyuan Jiang, Jiahai Yang. EAGLEYE: Exposing Hidden Web Interfaces in IoT Devices via Routing Analysis. The Network and Distributed System Security (NDSS) Symposium 2025, Feb. 24-28, 2025, San Diego, USA.

[3] Hongxu Chen, Guanglei Song, Zhiliang Wang, Jiahai Yang, et al. IPdb: A High-Precision IP Level Industry Categorization of Web Services. The ACM Web Conference 2025, Sydney, Australia, Apr. 28 – May 2, 2025

[4] Enhuan Dong, Jiahai Yang, Zhiliang Wang, Xin He, Jie Fang, Shenao Li, Supei Zhang, Zeyuan Guo, Hui Zhang, Zimu Li, Xiaoming Fu Internet Scan Source Identification: A Survey,IEEE Network. 2025, DOI: 10.1109/MNET.2025.3574126

[5] Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang. Adaptive traffic engineering with segment routing through deep reinforcement learning. Computer Networks 267 (2025) 111356

[6] Jinlei Lin, Chenglong Li, Wenwen Gong, Linna Fan, Guanglei Song and Jiahai Yang, ProbeGeo: A Comprehensive Landmark Mining Framework Based on Web Content. IEEE/ACM Transactions on Networking. doi: 10.1109/TNET.2024.3422089

[7] Wenjian Zhang, Guanglei Song, Lin He, Jinlei Lin, Songyun Wu, Zhiliang Wang, Chenglong Li, Jiahai Yang, 6Vision: Image-Encoding-based IPv6 Target Generation in Few-seed Scenarios, The 32nd IEEE International Conference on Network Protocols (ICNP 2024), Charleroi, Belgium, Oct. 28-31, 2024

[8] Hongbin Sun, Su Wang, Zhiliang Wang, Zheyu Jiang, Dongqi Han, Jiahai Yang, AudiTrim: A Real-time, General, Efficient, and Low-overhead Data Compaction System for Intrusion Detection, Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and Defenses(RAID '24), Pages 263–277, Sep. 30–Oct. 02, 2024, Padua, Italy

[9] Shize Zhang, Yunfeng Zhao, Jianyuan Lu, Biao Lyu, Shunmin Zhu, Zhiliang Wang, Jiahai Yang, et al. CloudPin-Fast: Efficient and Effective Root Cause Localization for Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks. Transactions on Services Computing, Vol. 17, No. 3, May/June 2024, pp.850-864

[10] Ying Zhong, Zhiliang Wang, Xingang Shi, Jiahai Yang, Keqin Li. RFG-HELAD: A Robust Fine-Grained Network Traffic Anomaly Detection Model Based on Heterogeneous Ensemble Learning. IEEE Transactions on Information Forensics & Security, Vol. 19, 2024, pp. 5895-5910

[11] Guanglei Song, Lin He, Tianyun Zhao, Yirui Luo, Yichao Wu, Linna Fan, Chenglong Li, Zhiliang Wang, Jiahai Yang. PMap: Reinforcement Learning-Based Internet-Wide Port Scanning. IEEE/ACM Transactions on Networking, Vol. 32, No. 6, Dec. 2024. DOI: 10.1109/TNET.2024.3491314 (https://ieeexplore.ieee.org/document/10758701

[12] Dongqi Han, Zhiliang Wang, Ruitao Feng, Minghui Jin, Wenqi Chen, Kai Wang , Su Wang, Jiahai Yang, Xingang Shi, Xia Yin ,Yang Liu. Rules Refine the Riddle: Global Explanation for Deep Learning-Based Anomaly Detection in Security Applications. ACM CCS 2024, Oct. 14-18, 2024, Salt Lake City, USA(杰出技术成果奖)

[13] Yirui Luo, Chenglong Li, Zhiliang Wang, Jiahai Yang. IPREDS: Efficient prediction system for Internet-wide port and service scanning. Proceedings of the ACM on Networking, Vol. 2, Issue CoNEXT1, Article No.: 2, pp 1–24,(https://dl.acm.org/doi/abs/10.1145/3649470

[14] Shunmin Zhu, Jianyuan Lu, Biao Lyu, Tian Pan, Chenhao Jia, Xin Cheng, Daxiang Kang, Yilong Lv, Fukun Yang, Xiaobo Xue, Zhiliang Wang, Jiahai Yang. Proactive Telemetry in Large-Scale Multi-tenant Cloud Overlay Networks. IEEE/ACM Transactions on Networking, DOI: 10.1109/TNET.2024.3381786

[15] Wenqi Chen, Zhiliang Wang, Liyuan Chang, Kai Wang, Ying Zhong, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi. Network anomaly detection via similarity-aware ensemble learning with ADSim. Computer Networks, Vol. 247, June 2024, 110423

[16] Libing Qiao, Enhuan Dong, Huanpu Yin, Haisheng Li, Jiahai Yang. Intelligent Network Device Identification based on Active TCP/IP Stack Probing. IEEE Network, doi: 10.1109/MNET.2024.3374080

[17] Hai Lin, Chenglong Li, Jiahai Yang, Zhiliang Wang, Linna Fan, Chenxin Duan. CP-IoT: A Cross-Platform Monitoring System for Smart Home. The Network and Distributed System Security (NDSS) Symposium 2024, Feb. 26-Mar. 1, 2024, San Diego, USA.

[18] Shicheng Wang, Menghao Zhang, Yuying Du, Ziteng Chen, Zhiliang Wang, Mingwei Xu, Renjie Xie, Jiahai Yang. LoRDMA: A New Low-Rate DoS Attack in RDMA Networks. The Network and Distributed System Security (NDSS) Symposium 2024, Feb. 26-Mar. 1, 2024, San Diego, USA

[19] Chenxin Duan, Sainan Li, Hai Lin, Wenqi Chen, Guanglei Song, Chenglong Li, Jiahai Yang, Zhiliang Wang. IoTa: Fine-grained Traffic Monitoring for IoT Devices via Fully Packet-level Models[J]. IEEE Transactions on Dependable and Secure Computing (TDSC) , 2023. DOI 10.1109/TDSC.2023.3340563.

[20] Yufan Chen; Jiahai Yang; Susu Cui; Cong Dong; Bo Jiang; Yuling Liu; Zhigang Lu. Unveiling encrypted traffic types through hierarchical network characteristics. Computers & Security, Volume 138, March 2024, 103645. doi.org/10.1016/j.cose.2023.103645

[21] Xin He, Enhuan Dong, Jiahai Yang, Shize Zhang, et al. CloudPlanner: Minimizing Upgrade Risk of Virtual Network Devices for Large-Scale Cloud Networks. IEEE INFOCOM 2024 (IEEE International Conference on Computer Communications), May 20-23, 2024, Vancouver, Canada

[22] 宋光磊, 张文健, 林金磊, 韩东岐, 王之梁, 张辉, 杨家海. 6EDL:高效的大规模活跃IPv6地址探测系统. 计算机学报,2024, 47(8): 1949-1969

[23] 樊琳娜, 李城龙, 吴毅超, 段晨鑫, 王之梁, 林海, 杨家海. 物联网设备识别及异常检测研究综述. 软件学报, 2024, 35(1): 288–308. http://www.jos.org.cn/1000-9825/6818.htm

[24] Long Pan, Jiahai Yang, Lin He, Zhiliang Wang, Leyao Nie, Guanglei Song, Yaozhong Liu. Your Router is My Prober: Measuring IPv6 Networks via ICMP Rate Limiting Side Channels, NDSS 2023 27 Feb. 27 – Mar. 3, 2023, San Diego, California, USA (杰出论文奖)

[25] Kai Wang, Zhiliang Wang, Dongqi Han, Wenqi Chen, Jiahai Yang, Xingang Shi, Xia Yin. BARS: Local Robustness Certification for Deep Learning based Traffic Analysis Systems. NDSS 2023 27 Feb. 27 – Mar. 3, 2023, San Diego, California, USA

[26] Dongqi Han, Zhiliang Wang*, Wenqi Chen, Kai Wang, Rui Yu, Su Wang, Han Zhang, Zhihua Wang, Minghui Jin, Jiahai Yang, Xingang Shi, Xia Yin. Anomaly Detection in the Open World: Normality Shift Detection, Explanation, and Adaptation. NDSS 2023 27 Feb. 27 – Mar. 3, 2023, San Diego, California, USA

[27] Cong Dong, Jiahai Yang, Song Liu, Zhi Wang, Yuling Liu and Zhigang Lu. C-BEDIM and S-BEDIM: Lateral Movement Detection In Enterprise Network Through Behavior Deviation Measurement. Computers & Security, Volume 130 Issue C. DOI:10.1016/j.cose.2023.103267

[28] Enhuan Dong, Peng Gao, Yuan Yang, Mingwei Xu, Xiaoming Fu, Jiahai Yang. SmartSBD: Smart Shared Bottleneck Detection for Efficient Multipath Congestion Control over Heterogeneous Networks. Computer Networks, Volume 237, Dec. 2023, 110047.

[29] Guanglei Song, Lin He, Tianyun Zhao, Yirui Luo, Yichao Wu, Linna Fan, Chenglong Li, Zhiliang Wang, Jiahai Yang. Which Doors Are Open: Reinforcement Learning-based Internet-wide Port Scanning. IEEE/ACM IWQoS 2023, Orlando, Florida, USA

[30] Linna Fan, Lin He, Xiaoqing Sun, Enhuan Dong, Jiahai Yang, Zhiliang Wang, Jinlei Lin, and Guanglei Song. GraphIoT: Accurate IoT Identification based on Heterogeneous Graph. IEEE/ACM IWQoS 2023, Orlando, Florida, USA

[31] Song G, He L, Zhu F, et al. AddrMiner: A Fast, Efficient, and Comprehensive Global Active IPv6 Address Detection System. IEEE/ACM Transactions on Networking (TON), 2024, DOI: 10.1109/TNET.2024.3406508

[32] Guanglei Song, Jiahai Yang, Zhiliang Wang, Lin He, Jinlei Lin, Long Pan, Chenxin Duan, Xiaowen Quan. DET: Enabling Efficient Probing of IPv6 Active Addresses. IEEE/IFIP Transactions on Networking, Vol. 30, No. 4,pp. 1629-1643, Aug. 2022. DOI: 10.1109/TNET.2022.3145040

[33] Su Wang, Zhiliang Wang, Tao Zhou, Xia Yin, Dongqi Han, Han Zhang, Xingang Shi, Jiahai Yang. threaTrace: Detecting and Tracing Host-based Threats in Node Level Through Provenance Graph Learning. IEEE Transactions on Information Forensics & Security,2022, 17(12): 3972-3987, DOI: 10.1109/TIFS.2022.3208815

[34] Linna Fan, Lin He, Yichao Wu, Shize Zhang, Zhiliang Wang, Jia Li, Jiahai Yang, Chaocan Xiang and Xiaoqian Ma. AutoIoT: Automatically Updated IoT Identification with Semi-supervised Learning. IEEE Transactions on Mobile Computing, 2023, 22(10), pp. 5769 - 5786 (DOI 10.1109/TMC.2022.3183118)

[35] Linna Fan, Lin He, Enhuan Dong, Jiahai Yang. EvoIoT: An Evolutionary IoT and Non-IoT Classification Model in Open Environments. Computer Networks Vol. 219, Dec. 2022, 109450. https://doi.org/10.1016/j.comnet.2022.109450

[36] Songyun Wu, Bo Wang, Zhiliang Wang, Shuhan Fan, Jiahai Yang. Joint prediction on security event and time interval through deep learning. Computers & Security, v 117, June 2022

[37] Lin He, Gang Ren, Ying Liu, Guanglei Song, Jinlong E, Jiahai Yang, Mingwei Xu. SAV6: A Novel Inter-AS Source Address Validation Protocol for IPv6 Internet. IEEE Network, Sep. 2023, Vol. 37, Issue 5, pp. 64-70, DOI: 10.1109/ MNET.123.2200111

[38] Xin Cheng, Zhiliang Wang, Shize Zhang, Xin He, Jiahai Yang. IntStream: Towards Flexible, Expressive and Scalable Network Telemetry. IEEE Transactions on Network and Service Management, 2022, 19(3): 2854 – 2868.

[39] Qing Li, Yichao Wu, Jingpu Duan, Jiahai Yang, et al. Weighted NSFIB Aggregation with Generalized Next Hop of Strict Partial Order. IEEE Transactions on Network and Service Management (TNSM), 2022, 19(2): 890-904

[40] Chenxin Duan, Hao Gao, Guanglei Song, Jiahai Yang, Zhiliang Wang. ByteIoT: a Practical IoT Device Identification System based on Packet Length Distribution. IEEE Transactions on Network and Service Management (TNSM), 2022, 19(2): 1717- 1728

[41] Guanglei Song, Jiahai Yang, Lin He, Zhiliang Wang, Guo Li, Chenxin Duan, and Yaozhong Liu, Zhongxiang Sun. AddrMiner: A Comprehensive Global Active IPv6 Address Discovery System. 2022 USENIX Annual Technical Conference, Jul. 11–13, 2022, Carlsbad, CA, USA.

[42] Wenqi Chen, Zhiliang Wang, Dongqi Han, Chenxin Duan, Xia Yin, Jiahai Yang, Xingang Shi, Han Zhang. ROV-MI: Large-Scale, Accurate and Efficient Measurement of ROV Deployment. NDSS 2022, Apr. 24-28, 2022, San Diego, CA, USA

[43] Shunmin Zhu, Jianyuan Lu, Biao Lyu, Tian Pan, Chenhao Jia, Xin Cheng, Daxiang Kang, Yilong Lv, Fukun Yang, Xiaobo Xue, Zhiliang Wang, Jiahai Yang. Zoonet - A Proactive Telemetry System for Large-Scale Cloud Networks. The 18th International Conference on emerging Networking EXperiments and Technologies (CoNext 2022). Rome, Italy. Dec. 6-9, 2022.

[44] Ying Tian, Zhiliang Wang, Xia Yin, Xingang Shi, Jiahai Yang, Han Zhang. Centralized Network Utility Maximization with Accelerated Gradient Method. IEEE ICNP’2022, Oct. 30-Nov. 2, 2022, Lexington, KY, USA

[45] Shize Zhang, Zhiliang Wang, Jiahai Yang, MineHunter: A Practical Cryptomining Traffic Detection Algorithm Based on Time Series Tracking, the 2021 Annual Computer Security Applications Conference (ACSAC 2021), Dec. 6-10, 2021

[46] Shize Zhang, Yunfeng Zhao, Jianyuan Lu, Biao Lyu, Shunmin Zhu, Zhiliang Wang, Jiahai Yang, et al, CloudPin: A Root Cause Localization Framework of Shared Bandwidth Package Traffic Anomalies in Public Cloud Networks, The 32nd International Symposium on Software Reliability Engineering (ISSRE 2021),Oct 25 - 28, 2021

[47] Dongqi Han, Zhiliang Wang, Wenqi Chen, Ying Zhong, Su Wang, Han Zhang, Jiahai Yang, et al, DeepAID: Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications, ACM Conference on Computer and Communications Security (CCS 2021). Seoul, Korea. Nov. 14-19, 2021

[48] Xiaoli Zhang, Qi Li, Zeyu Zhang, Jianping Wu, Jiahai Yang, vSFC: Generic and Agile Verification of Service Function Chains in the Cloud, IEEE/ACM Transactions on Networking, Vol.29, No.1, Feb. 2021, pp 78-91

[49] Lin He, Gang Ren, Ying Liu, Jiahai Yang, PAVI: Bootstrapping Accountability and Privacy to IPv6 Internet, IEEE/ACM Transactions on Networking, Vol 29, No. 2, April 2021, pp 695-708

[50] Dongqi Han, Zhiliang Wang, Ying Zhong, Wenqi Chen, Jiahai Yang, et al, Evaluating and Improving Adversarial Robustness of Machine Learning-Based Network Intrusion Detectors. IEEE Journal on Selected Areas in Communications (JSAC). 2021, 39(8): 2632-2647.

[51] Lin He, Peng Kuang, Ying Liu, Gang Ren, Jiahai Yang, Towards securing Duplicate Address Detection using P4, Computer Networks, Vol. 198, 24 Oct. 2021, 108323

[52] Chenxi Li, Jia Li, Jiahai Yang, Jinlei Lin, A novel workload scheduling framework for intrusion detection system in NFV scenario, Computers and Security, v 106, July 2021 (https://doi.org/10.1016/j.cose.2021.102271)

2. 教材和专著

[1] 杨家海,何林,李城龙,网络空间测绘—原理、技术与应用,人民邮电出版社,2023年8月

[2] 杨家海,安常青,网络空间安全—拒绝服务攻击检测与防御,高等教育出版社,2019年1月,北京

[3] 杨家海,吴建平,安常青,互联网络测量理论与应用,人民邮电出版社,2009年10月,北京

[4] 杨家海,任宪坤,王佩瑜,网络管理原理与实现技术,清华大学出版社,2000年10月,北京