Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where ByungRae Cha is active.

Publication


Featured researches published by ByungRae Cha.


Proceedings of the Asia-Pacific Advanced Network | 2013

OF@TEIN: An OpenFlow-enabled SDN Testbed over International SmartX Rack Sites

JongWon Kim; ByungRae Cha; Jongryool Kim; Namgon Kim; Gyeongsoo Noh; Youngwan Jang; Hyeong Geun An; Hongsik Park; JiHoon Hong; DongSeok Jang; TaeWan Ko; Wang-Cheol Song; Seokhong Min; Jae Yong Lee; Byung-Chul Kim; Ilkwon Cho; Hyong-Soon Kim; Sunmoo Kang

In this paper, we will discuss our on-going effort for OF@TEIN SDN (Software-Defined Networking) testbed, which currently spans over Korea and five South-East Asian (SEA) collaborators with internationally deployed OpenFlowenabled SmartX Racks.


international conference on it convergence and security, icitcs | 2012

Design of Attribute-Based Access Control in Cloud Computing Environment

ByungRae Cha; JaeHyun Seo; JongWon Kim

Future Internet Groups have been studying networking virtualization and computing virtualization for Testbed. Specially, GENI have adopted cloud computing as computing virtualization technique. But the traditional access control models are closed and inflexible in cloud computing environment. The integration of Attribute Based Access Control (ABAC) model, which makes decisions relying on attributes of requestors, services, resources, and environment, is scalable and flexible and thus is more suitable for distributed, open systems, such as Cloud computing system. This paper presents an Attribute Based Access Control model and the authorization requirements of Cloud computing systems.


ieee international conference on dependable, autonomic and secure computing | 2011

Study of Multistage Anomaly Detection for Secured Cloud Computing Resources in Future Internet

ByungRae Cha; JongWon Kim

Future Internet Groups have been studying networking virtualization and computing virtualization for Test bed. Specially, GENI have adopted cloud computing as computing virtualization technique. In this paper, we describe the multistage anomaly detection scheme of anomaly and symptoms of DDoS attacks for secured cloud computing resource. This scheme is composed by 3 stages. Monitoring stage performs misuse detection by rules of attack patterns to well known DDoS attacks. Lightweight anomaly detection stage could classified volume data into large volume data and small volume data, and applied Bayesian methods to detect anomaly and symptoms of DDoS attack. And focused anomaly detection stage is performed to detect novel DDoS attacks by unsupervised learning algorithm.


International Journal of Grid and Utility Computing | 2013

Handling and analysis of fake multimedia contents threats with collective intelligence in P2P file sharing environments

ByungRae Cha; JongWon Kim

In this paper, we discuss the question of removing fake multimedia content files, intentionally manipulated by a group of attackers. By employing the un-biased collective intelligence of participating P2P peer-to-peer nodes, we identify and remove fake multimedia content files based on the reputation management. The proposed scheme determines the reputation value according to the trustworthiness along with confidence of multimedia content files, which are statistically drawn by collectively relating the decision making of individual peers about each multimedia content file. To verify this, we simulate the detection and recovery of the proposed reputation management that employs K-means and LBG clustering algorithms over colluded attackers.


2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing | 2010

Handling Fake Multimedia Contents Threat with Collective Intelligence in P2P File Sharing Environments

ByungRae Cha; JongWon Kim

In this paper, we are discussing the question of removing fake multimedia content files, intentionally manipulated by a group of attackers. By employing un-biased collective intelligence of P2P nodes, we identify and remove fake multimedia content files based on the reputation management. The proposed scheme determine the reputation value according to trustworthy (along with confidence) of multimedia content files, which are statistically drawn by relating the collection of decision making of individual users about each multimedia content file. To verify this, we simulated the recovering reputation by LBG clustering for attacked area.


complex, intelligent and software intensive systems | 2013

Design of NFC Based Micro-payment to Support MD Authentication and Privacy for Trade Safety in NFC Applications

ByungRae Cha; JongWon Kim

Near Field Communication (NFC) is an integration of contact less smart card communication technology into mobile devices, such as smart phones. NFC technology provides three operating modes and each mode differs from each other in terms of communication and data processing model. We design the NFC based Micro-payment system and security functions for trade safety. The sales of small retail trade and traditional markets are on a decreasing trend. In order to solve this problem, we propose the Micro-payment model based on NFC, tokenization technique to support the privacy of Micro-payment, and MD authentication technique for fasten Micro-payment in aspect of IT.


international conference on information science and applications | 2011

Prototype Analysis of OTP Key-Generation Based on Mobile Device Using Voice Characteristics

ByungRae Cha; Nam-Ho Kim; JongWon Kim

As the applications of mobile and ubiquitous technologies have become more extensive, the communication security issues of those applications are emerging as the most important concern. Therefore, studies are active in relation with various techniques and system applications for individual security elements. In this paper, we proposed a new technique which uses the voice features in order to generate Mobile One Time Passwords (OTPs) and generated safe and variable and safe passwords for one time use, using voice information of biometrics, which is used for powerful personal authentication. Also, we performed a simulation of homomorphic variability of voice feature points using dendrogram and distribution of voice feature points for the proposed password generation method.


complex, intelligent and software intensive systems | 2017

Performance Testing of Mass Distributed Abyss Storage Prototype for SMB

ByungRae Cha; YoonSeok Cha; Sun Park; JongWon Kim

The trends in ICT are concentrated in IoT, Bigdata, and Cloud Computing. These megatrends do not operate independently, and mass storage technology is essential as large computing technology is needed in the background to support them. In order to evaluate the performance of high-capacity storage based on open source Ceph, we carry out the demonstration test of abyss storage with domestic and overseas sites using educational network: KOREN. In addition, storage media and network bonding are tested to evaluate the performance of the storage itself.


international conference on cloud computing | 2016

Design and Verification of Software-Defined RAID for Hybrid Cloud Storage

ByungRae Cha; Sun Park; JongWon Kim

This paper proposes a software defined storaging method to converge the network virtualization technique and the RAID of distributed hybrid cloud storage environment. The proposed method designs software-defined based storage which it apply a flexible control and maintenance of distributed hybrid cloud storages. In addition, the method overcomes the restricted of physical storage capacity and cut costs of data recovery. The proposed Software-Defined RAID based failover recovery techniques have been tested the substantial verification using public AWS and Google Storage.


advanced information networking and applications | 2015

Secured mVoIP Service over Cloud and Container-Based Improvement

ByungRae Cha; Sun Park; Sujeong Shim; JongWon Kim

The VoIP technology is being revisited to support diversified services and mobile computing has been changing to mobile cloud computing paradigm. In this paper, we design and implement cloud-leveraged secured voice services, enabled by the combination of open-source software PBX (private branch exchange), shared hardware platform, and mobile devices. We also test and verify the end-to-end delay of the secured voice communication. In addition, we propose a preliminary idea to improve the portability by adopting Docker-based containers.

Collaboration


Dive into the ByungRae Cha's collaboration.

Top Co-Authors

Avatar

JongWon Kim

Gwangju Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Sun Park

Mokpo National University

View shared research outputs
Top Co-Authors

Avatar

Yoo-Kang Ji

Gwangju Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

DaeKyu Kim

Gwangju Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Byeong-Chun Shin

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar

JaeHyun Seo

Mokpo National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge