Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Deokjin Kim is active.

Publication


Featured researches published by Deokjin Kim.


computer and communications security | 2012

Kargus: a highly-scalable software-based intrusion detection system

Muhammad Asim Jamshed; Jihyung Lee; Sangwoo Moon; Insu Yun; Deokjin Kim; Sungryoul Lee; Yung Yi; KyoungSoo Park

As high-speed networks are becoming commonplace, it is increasingly challenging to prevent the attack attempts at the edge of the Internet. While many high-performance intrusion detection systems (IDSes) employ dedicated network processors or special memory to meet the demanding performance requirements, it often increases the cost and limits functional flexibility. In contrast, existing software-based IDS stacks fail to achieve a high throughput despite modern hardware innovations such as multicore CPUs, manycore GPUs, and 10 Gbps network cards that support multiple hardware queues. We present Kargus, a highly-scalable software-based IDS that exploits the full potential of commodity computing hardware. First, Kargus batch processes incoming packets at network cards and achieves up to 40 Gbps input rate even for minimum-sized packets. Second, it exploits high processing parallelism by balancing the pattern matching workloads with multicore CPUs and heterogeneous GPUs, and benefits from extensive batch processing of multiple packets per each IDS function call. Third, Kargus adapts its resource usage depending on the input rate, significantly saving the power in a normal situation. Our evaluation shows that Kargus on a 12-core machine with two GPUs handles up to 33 Gbps of normal traffic and achieves 9 to 10 Gbps even when all packets contain attack signatures, a factor of 1.9 to 4.3 performance improvements over the existing state-of-the-art software IDS. We design Kargus to be compatible with the most popular software IDS, Snort.


Archive | 2012

TWO-STAGE INTRUSION DETECTION SYSTEM FOR HIGH-SPEED PACKET PROCESSING USING NETWORK PROCESSOR AND METHOD THEREOF

YoungHan Choi; Deokjin Kim; Sungryoul Lee; Man-hee Lee; Byung-Chul Bae; Sang-Woo Park; E-Joong Yoon


Archive | 2009

Method for authentication using one-time identification information and system

Kwansoo Jung; Soo Hyung Kim; Deokjin Kim; Seung-Hun Jin; Youngseob Cho; Jin-man Cho; Sangrae Cho; Daeseon Choi; Jong-Hyouk Noh; Seung-Hyun Kim


Archive | 2010

Method and apparatus for partially encoding/decoding data for commitment service and method of using encoded data

Seung-Hyun Kim; Jong-Hyouk Noh; Deokjin Kim; Soo Hyung Kim; Sangrae Cho; Youngseob Cho; Jin-man Cho; Daeseon Choi; Seung-Hun Jin


Archive | 2009

Recommendation system for user's decision about the sharing of private information to other party and method thereof

Seung-Hyun Kim; Seung-Hun Jin; Jin-man Cho; Youngseob Cho; Sangrae Cho; Daeseon Choi; Jong-Hyouk Noh; Soo Hyung Kim; Kwansoo Jung; Deokjin Kim


Archive | 2010

KEY TREE CONSTRUCTION AND KEY DISTRIBUTION METHOD FOR HIERARCHICAL ROLE-BASED ACCESS CONTROL

Jong-Hyouk Noh; Deokjin Kim; Soo Hyung Kim; Seung-Hyun Kim; Sang Rae Cho; Young Seob Cho; Jin-man Cho; Dae Seon Choi; Seung Hun Jin


Archive | 2010

PSEUDONYMOUS IDENTIFICATION MANAGEMENT APPARATUS, PSEUDONYMOUS IDENTIFICATION MANAGEMENT METHOD, PSEUDONYMOUS IDENTIFICATION MANAGEMENT SYSTEM AND SERVICE ADMISSION METHOD USING SAME SYSTEM

Sang Rae Cho; Jin-man Cho; Young Seob Cho; Dae Seon Choi; Jong-Hyouk Noh; Soo Hyung Kim; Seung-Hyun Kim; Kwansoo Jung; Deokjin Kim; Seung Hun Jin


Archive | 2009

USER TERMINAL WITH IDENTITY SELECTOR AND METHOD FOR IDENTITY AUTHENTICATION USING IDENTITY SELECTOR OF THE SAME

Seung-Hyun Kim; Daeseon Choi; Deokjin Kim; Soo Hyung Kim; Jong-Hyouk Noh; Kwansoo Jung; Sangrae Cho; Youngseob Cho; Jin-man Cho; Seung-Hun Jin


Archive | 2009

APPARATUS FOR MANAGING IDENTITY DATA AND METHOD THEREOF

Daeseon Choi; Deokjin Kim; Soo Hyung Kim; Seung-Hyun Kim; Jong-Hyouk Noh; Kwansoo Jung; Sangrae Cho; Youngseob Cho; Jin-man Cho; Seung-Hun Jin


Archive | 2013

Intrusion detection apparatus and method using load balancer responsive to traffic conditions between central processing unit and graphics processing unit

Junghee Lee; Sungryoul Lee; Deokjin Kim; Young Han Choi; Byung-Chul Bae; HyungGeun Oh; Kiwook Sohn; Kyoungsoo Park; Yung Yi; Jihyung Lee; Sangwoo Moon

Collaboration


Dive into the Deokjin Kim's collaboration.

Top Co-Authors

Avatar

Jin-man Cho

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jong-Hyouk Noh

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Seung-Hyun Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Soo Hyung Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Daeseon Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Kwansoo Jung

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sangrae Cho

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Seung-Hun Jin

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Youngseob Cho

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Byung-Chul Bae

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge