Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Eungki Park is active.

Publication


Featured researches published by Eungki Park.


international conference on convergence information technology | 2007

Internet Threat Detection, Prediction and Relevant Reaction System for Pattern-freeWorm

Dae-Sik Choi; Woonyon Kim; Dongsu Kim; DoHoon Lee; Eungki Park

When in dual-shore software outsourcing, the working units are geographically distributed and each has unique management framework, procedure and security requirement. Timely business information convergence is necessary for the collaboration but difficult to achieve in such environment. A framework is proposed to adaptively collect the process information in dual-shore software outsourcing and to timely share the information among these heterogeneous working units. The further information analysis is also enabled, which may enhance the timely collaboration and decision making.With the development of Internet technology, the popularity of the malicious threat has grown beyond our imagination. The emergence of intelligent, sophisticated attack techniques makes the Internet services more vulnerable than ever, which become an important business technology in e-commerce. Many techniques have been proposed to detect (Zou et al., 2003; Lakhina and Diot, 2005; and Krishnamurthy et al., 2003), predict (Kai-Gui Wu, 2006 and Songjie Wei and Kirkovic, 2005) and react (Castaneda and Xuy, 2004 and Williamson, 2002) the malicious worm traffic, yet have limitations. In this paper, we proposed Internet threat detection, prediction and relevant reaction system for pattern-free worm. Our proposed system allows the system to detect, predict, react using grouping traffic characteristics. According to the proposed system, traffic factors generated by respective worms using k-means algorithms are grouped into N groups so that a great of Information may be effectively understood and a worm generated afterward is involved with characteristics of relevant group using cosine similarity for prediction and reaction.


intelligence and security informatics | 2004

Vulnerability analysis and evaluation within an intranet

Eungki Park; Jungtaek Seo; Eul Gyu Im; Cheolwon Lee

Recently computer incidents have increased rapidly and their ripple effects have also grown. Since computer systems become critical infrastructures in various areas, it is more and more important to protect the network and computer system assets from malicious incidents. Attackers try to search the vulnerabilities of the network and system, and penetrate to the network and system to do some malicious actions.


international conference on advanced communication technology | 2004

Design and implementation of firewall simulation based on SSFNet

Changhyun Baek; Eulgyu Im; Eungki Park; Kyungbee Choi; Gihyun Jung

In this paper, we design and implement a packet-filtering firewall on a famous simulation framework, SSFNet. One major drawback of many existing firewall simulator is not to be anble to present the dynamic behavior of simulation environment. The firewall implemented in this paper does he able to present its dynamic behavior as well as static behavior. We simulated the firewall module with several scenarios that represent famous harmful accesses to the Internet resources.


Lecture Notes in Computer Science | 2004

Adaptive architecture for web server survivability

Eungki Park; Dae-Sik Choi; Eul Gyu Im; Jung-Tack Seo; Dongkyu Kim

Internet becomes more and more popular, and most companies and institutes use web services as a fundamental tools to promote their business. As results, Internet and web services become core infrastructure for a business and become more and more important, but attacks against web services increase as the popularity of web services grows. Therefore, there are increasing needs of undisturbed web services despite of attacks. In this paper, we proposed adaptation policies for a web-server intrusion tolerant system. Our proposed adaptation policies allow the system to provide continuous web services using various techniques, such as intrusion tolerant types, replication degree, server allocation mechanism, adaptive access control method and so on.


Archive | 2006

N grouping of traffic and pattern-free Internet worm response system and method using N grouping of traffic

Dae-Sik Choi; Woonyon Kim; Dongsu Kim; Cheolwon Lee; Eungki Park


Archive | 2006

System and method for detecting hidden process using system event information

Eun Young Kim; Youngtae Yun; Eungki Park


Archive | 2007

DDoS FLOODING ATTACK RESPONSE APPROACH USING DETERMINISTIC PUSH BACK METHOD

Jungtaek Seo; Kiwook Sohn; Eungki Park


Archive | 2006

System and method for detecting internet worm traffics through classification of traffic characteristics by types

Woonyon Kim; Dongsoo Kim; Dae-Sik Choi; Eungki Park


Archive | 2006

Multistep integrated security management system and method using intrusion detection log collection engine and traffic statistic generation engine

Woonyon Kim; Eun Young Lee; Sang Hoon Lee; Dong Su Nam; Joo Beom Yun; Jong Moon Lee; Miri Joo; DoHoon Lee; Eungki Park


Archive | 2006

System and method for transmitting cyber threat information in real time

Dong Su Nam; DoHoon Lee; Eungki Park

Collaboration


Dive into the Eungki Park's collaboration.

Top Co-Authors

Avatar

Woonyon Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jungtaek Seo

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Dae-Sik Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

DoHoon Lee

Pusan National University

View shared research outputs
Top Co-Authors

Avatar

Heemin Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jeong-Han Yun

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Cheolwon Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Dong Su Nam

Information and Communications University

View shared research outputs
Top Co-Authors

Avatar

Dongsu Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge