Kyungsan Cho

Learn More
As most applications in wired networks become available on mobile devices and mobile networks are well integrated with Internet, Botnet becomes the most significant threat to mobile devices. We propose a mobile Botnet detection scheme that detects "pull" style C&C channel. Our network-based scheme detects Botnet by inspecting abnormal flow features of(More)
In this paper, we propose a detection scheme to protect the Web server by inspecting HTTP outbound traffic from insider attacks which reveal confidential/private information or spread malware codes through Web. Our proposed scheme has a two-step hierarchy with a signature-based detector using Snort, and an anomaly-based detector using HMM. Through the(More)
In this paper, we propose a security proxy based protocol for authenticating the binding updates in Mobile IP Version 6 environment, which combines the Deng-Zhou-Bao¡s protocol [2] with Aura¡s two hash-based CGA scheme [8] to avoid the use of trusted CAs. The two hash-based CGA scheme enables our protocol to achieve stronger security than other CGA-based(More)
The basis of P2P traffic control is to classify P2P traffic accurately. Several methods such as port-based, signature-based, pattern-based and statistics-based method have been proposed for P2P traffic classification. However, as P2P applications have tried to avoid being easily detected, it becomes hard to classify P2P traffic accurately using only one(More)
In this paper, we propose an improved detection scheme to protect a Web server from detoured attacks, which disclose confidential/private information or disseminate malware codes through outbound traffic. Our scheme has a two-step hierarchy, whose detection methods are complementary to each other. The first step is a signature-based detector that uses Snort(More)
  • 1