Skip Navigation

Dr. Wei Lu

Assistant Professor
Computer Science
Putnam Science Center 158 • M-2001
603-358-2604

Degrees & Credentials: BS, MS, Electronics and Information Engineering, Huazhong University of Science and Technology (Wuhan, China); PhD Electrical and Computer Engineering, University of Victoria (British Columbia)

Professional Interests: Internet traffic classification, intrusion detection and prevention, and the application of artificial intelligence and machine learning techniques on practical computer and network security issues.

Professional Background: Postdoctoral research scientist, German Research Center for Artificial Intelligence, 2005–2006; secure software engineer, Q1 Labs Inc., 2009–2010 (Security Systems Division, IBM, since October 2011); junior member of technical staff (MTS-1), Bell Labs (Asia & Pacific), Alcatel-Lucent, 2001–2002.

Key Professional Work:

Ghorbani, A., Lu, W., Tavalaee, M. Network Intrusion Detection and Prevention: Concepts and Techniques. Springer Publisher, ISBN-10: 0387887709, Oct. 20, 2009.

David Zhao, Issa Traore, Bassam Sayed, Wei Lu, Sherif Saad, Ali Ghorbani and Dan Garant, Botnet Detection based on Traffic Behavior Analysis and Flow Intervals, Computer & Security, Elsevier, Accepted in Apr. 2013, currently under press.

Wei Lu, Goaletsa Rammidi and Ali A. Ghorbani. Clustering Botnet Communication Traffic Based on N-gram Feature Selection., Computer Communications, Vol. 34, No. 3, pp. 502-514, Elsevier, 2011.

Wei Lu and Ali A. Ghorbani. Network Anomaly Detection Based on Wavelet Analysis. Special Issue on Signal Processing Applications in Network Intrusion Detection Systems, EURASIP Journal on Advances in Signal Processing, Article No. 4, pp. 1-16, Hindawi, Jan. 2009.

Wei Lu and Issa Traore. Detecting New Forms of Network Intrusion Using Genetic Programming. Computational Intelligence. Volume 20, Issue 3, pp. 475-494, Wiley Publisher, August 2004.

Wei Lu and Issa Traore. Unsupervised Anomaly Detection Using an Evolutionary Extension of K-means Algorithm. International Journal on Information and Computer Security, Volume 2, Number 2, pp. 107-139, Inderscience Publisher, May 2008.

Dan Garant, Wei Lu, Mining Botnet Behaviors on the Large-scale Web Application Community. In Proceedings of The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, March 25 - 28, 2013.

David Zhao, Issa Traore, Ali Ghorbani, Bassam Sayed, Sherif Saad, Wei Lu. Peer-to-peer Botnet Detection Based On Flow Intervals, In Proceedings of 2012 IFIP International Information Security and Privacy Conference, 4-6 June 2012 Heraklion, Crete, Greece.

Wei Lu and Ali Ghorbani. A Multiple-stage Classifier for Discovering Unknown Internet Traffic. Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 2011), Victoria, B.C., August 2011.

Sherif Saad, Issa Traore, Ali Ghorbani, Bassam Sayed, David Zhao, Wei Lu, John Felix, Payman Hakimian. Detecting P2P Botnets through Network Behavior Analysis and Machine Learning, In Proceedings of 9th IEEE Annual Conference on Privacy, Security and Trust (PST2011), Montreal, Quebec, Canada.

Mahbod Tavallaee, Wei Lu, Ebrahim Bagheri, Ali A. Ghorbani: Automatic Discovery of Network Applications: A Hybrid Approach. In Proceedings of 23rd Canadian Conference on AI Ottawa, Canada, May 31 - June 2, 2010, pp. 208-219.

Wei Lu, Mahbod Tavallaee and Ali. A. Ghorbani. Automatic Discovery of Botnet Communities on Large-Scale Communication Networks. In Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009. ACM 2009, pp. 1-10.

Wei Lu and Ali A. Ghorbani. Hybrid Traffic Classification Approach Based on Decision Tree. In Proceedings of the Communications Quality of Service, Reliability & Performance Modeling Symposium, IEEE Global Communications Conference (GLOBECOM 2009), pp. 1 - 6, USA 2009.

Wei Lu, Mahbod Tavallaee, Goaletsa Rammidi and Ali A. Ghorbani. BotCop: An Online Botnets Traffic Classifier. In Proceedings of the 7th Annual Conference on Communication Networks and Services Research (CNSR 2009), Moncton, New Brunswick, Canada, May 11 - 13, 2009. pp. 70-77.

Wei Lu and Hengjian Tong. Detecting Network Anomalies Using CUSUM and EM Clustering. In Proceedings of the 4rd International Symposium on Intelligence Computation and Applications (ISICA 2009), pp. 297 - 308.

Mahbod Tavallaee, Wei Lu, and Ali A. Ghorbani. Online Classification of Network Flows. In Proceedings of the 7th Annual Conference on Communication Networks and Services Research (CNSR 2009), Moncton, New Brunswick, Canada, May 11 - 13, 2009. pp. 78-85.

Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu and Ali A. Ghorbani. A Detailed Analysis of the KDD CUP 99 Data Set. In Proceedings of the 2nd IEEE Symposium on Computational Intelligence for Security and Defense Applications, June 2009.

Wei Lu, Hengjian Tong and Issa Traore. E-means: An Evolutionary Clustering Algorithm. In Proceedings of the 3rd International Symposium on Intelligence Computation and Applications (ISICA 2008), Wuhan, China, December 19-21, 2008. pp. 537-545.

Wei Lu and Ali A. Ghorbani. Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks. Proceedings of 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), R. Lippmann, E. Kirda, and A. Trachtenberg (Eds.): RAID 2008, LNCS 5230, pp. 415-416, MIT, Boston, USA 2008.

Wei Lu, Mahbod Tavallaee and Ali. A. Ghorbani. Detecting Network Anomalies Using Different Wavelet Basis Functions. Proceedings of the 6th Annual Conference on Communication Networks and Services Research (CNSR 2008), Halifax, Nova Scotia, pp. 149-156, 2008.

Wei Lu and Ali A. Ghorbani. Botnets Detection Based on IRC-Community. In Proceedings of the Communications and Information Security Symposium, Global Communications Conference (IEEE GLOBECOM 2008), Nov. 30 - Dec. 4, New Orleans, LA, USA. pp. 2067-2071.

Mahbod Tavallaee, Wei Lu, Arif Iqbal and Ali A. Ghorbani. A Novel Covariance Matrix Based Approach for Detecting Network Anomalies. Proceedings of 6th Annual Conference on Communication Networks and Services Research (CNSR 2008), Halifax, Nova Scotia, pp. 75-81, 2008.

Wei Lu and Issa Traore. A Novel Unsupervised Anomaly Detection Framework for Detecting Network Attacks in Real-time. Proceedings of 4th International Conference on Cryptology and Network Security (CANS 2005), Lecture Notes in Computer Science, Vol. 3810, pp. 96-109, ISBN 3-540-30849-0, Springer, 2005.

Wei Lu and Issa Traore. Determining the Optimal Number of Clusters Using a New Evolutionary Algorithm. Proceedings of IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2005), pp. 712-713, Hongkong, November 2005.

Wei Lu and Issa Traore. An Unsupervised Approach for Detecting DDoS Attacks Based on Traffic Based Metrics. Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 2005), pp. 462-465, Victoria, B.C., August 2005.

Wei Lu and Issa Traore. A Novel Framework for Network Intrusion Detection Using Learning Techniques. Proceedings of IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 2005), pp. 458-461, Victoria, B.C., August 2005.

Wei Lu and Issa Traore. A New Evolutionary Algorithm for Determining the Optimal Number of Clusters. Proceedings of IEEE International Conference on Computational Intelligence for Modeling, Control and Automation (CIMCA 2005), Volume 1, pp. 648-653, 2005.

Wei Lu and Issa Traore. Detecting New Forms of Network Intrusion Using Genetic Programming. Proceedings of IEEE Congress on Evolutionary Computation (CEC 2003), pp. 2165-2172, 2003.

Is this your profile? Edit