Hyuncheol Jeong

Learn More
The malicious botnets are evaluated as the serious threat of the Internet society in future. As the botnets are more clever and artful, the detection of botnets is not easy. Recently malicious botnets evolve into HTTP botnets out of typical IRC botnets and it is difficult to response effectively with existing methods which are using DNS traffic. In this(More)
Recently, the number of Malware incidents has been rapidly increasing but we are too short of experts to handle the situation. Fortunately, most Malware instances are a mutation of an existing one, so it might be effective to use an auto-analysis system to observe a specific Malware. The auto-analysis system for Malware uses both the dynamic and static(More)
Countermeasures against botnet, which has been recognized as the Internet¿s biggest threat, are urgently needed to create a safe Internet environment. However, the current technology lags behind the evolution of botnet, and, unlike in the past, mutual cooperation among ISPs and countries is essential. As botnet is distributed internationally rather than in(More)
Recently, a malware is growing rapidly and the number of malware applies various techniques to protect itself from the anti-virus solution detection. The reason of this phenomenon is that a longer resident on an infected host guarantees the more profit. As a result, these many protection techniques are applied to a malware, a representative of those is a(More)
VoIP is more and more popular around the world. The number of residential VoIP subscribers worldwide is predicted to rise to 197.2 million in 2010, up more than 40x from 4.8 million in 2004. But VoIP security threats are both inherent in data networks and unique to VoIP such as eavesdropping, denial of service (DoS), service abuse, and so on. Especially,(More)
With the population of an internet telephony, the security issues of a SIP application service is focused on, currently. For example, VoIP is easier to access than existing PSTN, and more exposed at many security threats. However, there is not enough monitoring and attack detecting devices, yet. In this paper, we propose analysis factors, a detection(More)
Due to the sensitivity of the collected data in Ubiquitous Sensor Networks, security becomes the top priority issue for the USNs to be widely deployed. To enhance the security, various key management schemes have been proposed so that the messages among the sensor nodes can be encrypted. Especially, the Polynomial based key management scheme is famous(More)
VoIP spam will become severe problem preventing from generalization of VoIP service. For the purpose of presenting multi-leveled anti-spit framework, we divided VoIP service domain into three independent domains as an outbound, an intermediary, and an inbound domain. The proposed framework enables administrator to establish anti-spit policies in each(More)
Objective: If medical information is integrated for management purposes, the efficiency of the system may increase. In addition, diagnostic abilities of physicians may be improved through the increased speed and accuracy of information processing. Medical databases must ensure high performance in terms of speed and reliability. In addition, access to(More)