Yoon-Keun Oh

  • Citations Per Year
Learn More
There have been a number of researches to apply data mining techniques to intrusion detection. However, most of researches have mainly focused on the intrusion detection system in network area and have been done shortly in host area by applying a certain data mining technique to host-based intrusion detection. In this paper, we propose the architecture of(More)
Typical worm simulators analyze and model specific worm to simulate the worm's propagation effect. But those simulators are hard to simulate the variants of the worm and other worms that have different features. In this paper, we attempt to construct a worm taxonomy based on five steps; target discovery, vulnerability exploit, code transfer, activation and(More)
  • 1