Seong-Cheol Hong

Learn More
One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network(More)
Bacillus cereus is divided into emetic and enterotoxin producing strains. Emetic B. cereus showed the low level of genetic diversity and single evolutionary lineage but no specific study of the genotypic characterization of emetic B. cereus Korean strains has been conducted. The objective of this study was to investigate the genotypic diversity of emetic B.(More)
This paper analyzes the mobile data traffic traces of a CDMA network and presents its unique characteristics compared to the wired Internet traffic. The data set was passively collected from the backbone of a commercial mobile service provider. Our study shows the highly uneven up/downlink traffic utilization nature in mobile data networks along with small(More)
One recent trend in network security attacks is an increasing number of indirect attacks which influence network traffic negatively, instead of directly entering a system and damaging it. In future, damages from this type of attack are expected to become more serious. In addition, the bandwidth consumption by these attacks influences the entire network(More)
ISPs and enterprises usually overprovision their networks as a means of supporting QoS. In spite of that, the service quality of QoS-sensitive applications such as VoIP, video conferencing and streaming media may not be up to expectations. We believe this is due to sporadic but non-negligible packet losses due to traffic bursts even in underutilized links.(More)
IP prefix hijacking is a well-known security threat that corrupts Internet routing tables and has some common characteristics such as MOAS conflicts and invalid routes in BGP messages. We propose a simple but effective IP prefix hijacking detection method which is based on reachability monitoring. Network reachability means a characteristic that a packet(More)
The increasing popularity of P2P and multimedia applications around the world has resulted in significant global increases in network traffic. This paper investigates the traffic changes in our enterprise network by analyzing the day-long traffic traces from 2007 to 2009. We observe that there has been a substantial increase in traffic in the past few(More)
This paper presents a facile and efficient way to prepare carbon nanofibers ornamented with Au nanoparticles (Au/CNFs). Gold nanoparticles were first deposited in the channels of an anodized aluminum oxide (AAO) membrane by thermal decomposition of HAuCl4and then carbon nanofibers were produced in the same channels loaded with the Au nanoparticles by(More)