Hyun-Cheol Jeong

Learn More
In this paper, we propose a useful method for modeling multi-phased flows of P2P botnet traffic. Botnets are becoming more sophisticated and more dangerous each day and attackers use the P2P protocol to avoid centralized botnet topologies. We focus on the feature that a peer bot generates multiple traffic to communicate with large number of remote peers. In(More)
SIP is an application-level signaling protocol that manages a mutual multimedia communication session. Presently, SIP is widely used with Internet messaging, games and with VoIP (voice over IP) due to advantages such as its simplicity, flexibility and variety of protocols. However, SIP is associated with many types of security issues and requires a(More)
SIP is a signaling protocol used for establishing, modifying, terminating sessions in multimedia services such as VoIP, instant messaging, and video conferencing. Existing IP network security solutions can not detect new SIP specified network threats because they can not reflect characteristics of SIP. In this paper, we propose SIP-aware DDoS Attack(More)
While the Web provides much convenience and many people all over the world use it almost every day, it is often misused as a medium for distributing malware without users' knowledge. Special care is particularly needed with regard to Websites that are popular with users, since their infection with malware can greatly extend the scope of any damage. Damage(More)
While there are many ongoing research efforts for Denial-of-Service (DoS) attacks in the general Internet environment, there is insufficient research on voice networks. In this paper, we present the design and evaluation of a SIP-TRW algorithm for detection of DDoS attack traffic in VoIP networks. We analyzed existing TRW algorithms for detection of DDoS(More)