ByungRae Cha
Gwangju Institute of Science and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by ByungRae Cha.
Proceedings of the Asia-Pacific Advanced Network | 2013
JongWon Kim; ByungRae Cha; Jongryool Kim; Namgon Kim; Gyeongsoo Noh; Youngwan Jang; Hyeong Geun An; Hongsik Park; JiHoon Hong; DongSeok Jang; TaeWan Ko; Wang-Cheol Song; Seokhong Min; Jae Yong Lee; Byung-Chul Kim; Ilkwon Cho; Hyong-Soon Kim; Sunmoo Kang
In this paper, we will discuss our on-going effort for OF@TEIN SDN (Software-Defined Networking) testbed, which currently spans over Korea and five South-East Asian (SEA) collaborators with internationally deployed OpenFlowenabled SmartX Racks.
international conference on it convergence and security, icitcs | 2012
ByungRae Cha; JaeHyun Seo; JongWon Kim
Future Internet Groups have been studying networking virtualization and computing virtualization for Testbed. Specially, GENI have adopted cloud computing as computing virtualization technique. But the traditional access control models are closed and inflexible in cloud computing environment. The integration of Attribute Based Access Control (ABAC) model, which makes decisions relying on attributes of requestors, services, resources, and environment, is scalable and flexible and thus is more suitable for distributed, open systems, such as Cloud computing system. This paper presents an Attribute Based Access Control model and the authorization requirements of Cloud computing systems.
ieee international conference on dependable, autonomic and secure computing | 2011
ByungRae Cha; JongWon Kim
Future Internet Groups have been studying networking virtualization and computing virtualization for Test bed. Specially, GENI have adopted cloud computing as computing virtualization technique. In this paper, we describe the multistage anomaly detection scheme of anomaly and symptoms of DDoS attacks for secured cloud computing resource. This scheme is composed by 3 stages. Monitoring stage performs misuse detection by rules of attack patterns to well known DDoS attacks. Lightweight anomaly detection stage could classified volume data into large volume data and small volume data, and applied Bayesian methods to detect anomaly and symptoms of DDoS attack. And focused anomaly detection stage is performed to detect novel DDoS attacks by unsupervised learning algorithm.
International Journal of Grid and Utility Computing | 2013
ByungRae Cha; JongWon Kim
In this paper, we discuss the question of removing fake multimedia content files, intentionally manipulated by a group of attackers. By employing the un-biased collective intelligence of participating P2P peer-to-peer nodes, we identify and remove fake multimedia content files based on the reputation management. The proposed scheme determines the reputation value according to the trustworthiness along with confidence of multimedia content files, which are statistically drawn by collectively relating the decision making of individual peers about each multimedia content file. To verify this, we simulate the detection and recovery of the proposed reputation management that employs K-means and LBG clustering algorithms over colluded attackers.
2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing | 2010
ByungRae Cha; JongWon Kim
In this paper, we are discussing the question of removing fake multimedia content files, intentionally manipulated by a group of attackers. By employing un-biased collective intelligence of P2P nodes, we identify and remove fake multimedia content files based on the reputation management. The proposed scheme determine the reputation value according to trustworthy (along with confidence) of multimedia content files, which are statistically drawn by relating the collection of decision making of individual users about each multimedia content file. To verify this, we simulated the recovering reputation by LBG clustering for attacked area.
complex, intelligent and software intensive systems | 2013
ByungRae Cha; JongWon Kim
Near Field Communication (NFC) is an integration of contact less smart card communication technology into mobile devices, such as smart phones. NFC technology provides three operating modes and each mode differs from each other in terms of communication and data processing model. We design the NFC based Micro-payment system and security functions for trade safety. The sales of small retail trade and traditional markets are on a decreasing trend. In order to solve this problem, we propose the Micro-payment model based on NFC, tokenization technique to support the privacy of Micro-payment, and MD authentication technique for fasten Micro-payment in aspect of IT.
international conference on information science and applications | 2011
ByungRae Cha; Nam-Ho Kim; JongWon Kim
As the applications of mobile and ubiquitous technologies have become more extensive, the communication security issues of those applications are emerging as the most important concern. Therefore, studies are active in relation with various techniques and system applications for individual security elements. In this paper, we proposed a new technique which uses the voice features in order to generate Mobile One Time Passwords (OTPs) and generated safe and variable and safe passwords for one time use, using voice information of biometrics, which is used for powerful personal authentication. Also, we performed a simulation of homomorphic variability of voice feature points using dendrogram and distribution of voice feature points for the proposed password generation method.
complex, intelligent and software intensive systems | 2017
ByungRae Cha; YoonSeok Cha; Sun Park; JongWon Kim
The trends in ICT are concentrated in IoT, Bigdata, and Cloud Computing. These megatrends do not operate independently, and mass storage technology is essential as large computing technology is needed in the background to support them. In order to evaluate the performance of high-capacity storage based on open source Ceph, we carry out the demonstration test of abyss storage with domestic and overseas sites using educational network: KOREN. In addition, storage media and network bonding are tested to evaluate the performance of the storage itself.
international conference on cloud computing | 2016
ByungRae Cha; Sun Park; JongWon Kim
This paper proposes a software defined storaging method to converge the network virtualization technique and the RAID of distributed hybrid cloud storage environment. The proposed method designs software-defined based storage which it apply a flexible control and maintenance of distributed hybrid cloud storages. In addition, the method overcomes the restricted of physical storage capacity and cut costs of data recovery. The proposed Software-Defined RAID based failover recovery techniques have been tested the substantial verification using public AWS and Google Storage.
advanced information networking and applications | 2015
ByungRae Cha; Sun Park; Sujeong Shim; JongWon Kim
The VoIP technology is being revisited to support diversified services and mobile computing has been changing to mobile cloud computing paradigm. In this paper, we design and implement cloud-leveraged secured voice services, enabled by the combination of open-source software PBX (private branch exchange), shared hardware platform, and mobile devices. We also test and verify the end-to-end delay of the secured voice communication. In addition, we propose a preliminary idea to improve the portability by adopting Docker-based containers.