Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gihyun Jung is active.

Publication


Featured researches published by Gihyun Jung.


intelligent data engineering and automated learning | 2003

Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning

Sanguk Noh; Cheolho Lee; Kyunghee Choi; Gihyun Jung

As the complexity of Internet is scaled up, it is likely for the Internet resources to be exposed to Distributed Denial of Service (DDoS) flooding attacks on TCP-based Web servers. There has been a lot of related work which focuses on analyzing the pattern of the DDoS attacks to protect users from them. However, none of these studies takes all the flags within TCP header into account, nor do they analyze relationship between the flags and the TCP packets. To analyze the features of the DDoS attacks, therefore, this paper presents a network traffic analysis mechanism which computes the ratio of the number of TCP flags to the total number of TCP packets. Based upon the calculation of TCP flag rates, we compile a pair of the TCP flag rates and the presence (or absence) of the DDoS attack into state-action rules using machine learning algorithms. We endow alarming agents with a tapestry of the compiled rules. The agents can then detect network flooding attacks against a Web server. We validate our framework with experimental results in a simulated TCP-based network setting. The experimental results show a distinctive and predictive pattern of the DDoS attacks, and our alarming agents can successfully detect various DDoS attacks.


Applied Soft Computing | 2008

Compiling network traffic into rules using soft computing methods for the detection of flooding attacks

Sanguk Noh; Gihyun Jung; Kyunghee Choi; Cheolho Lee

The ability to dynamically collect and analyze network traffic and to accurately report the current network status is critical in the face of large-scale intrusions, and enables networks to continually function despite of traffic fluctuations. The paper presents a network traffic model that represents a specific network pattern and a methodology that compiles the network traffic into a set of rules using soft computing methods. This methodology based upon the network traffic model can be used to detect large-scale flooding attacks, for example, a distributed denial-of-service (DDoS) attack. We report experimental results that demonstrate the distinctive and predictive patterns of flooding attacks in simulated network settings, and show the potential of soft computing methods for the successful detection of large-scale flooding attacks.


IEEE Transactions on Consumer Electronics | 1997

A fast motion estimator for real-time system

Sangjoong Kim; Yonggil Kim; Kangbin Yim; Hwaja Chung; Kyunghee Choi; Yongdeak Kim; Gihyun Jung

We modify the three step search (TSS) algorithm to be applicable to real-time system, based on the statistics of motion vector distribution and propose a new architecture. The proposed technique includes a mechanism to stop the TSS algorithm anytime during its processing without degrading the accuracy of motion vector seriously. Thus, the anytime scheduling policy can be applied to the proposed algorithm for a less imprecise motion estimation in real-time application. The simple and regular architecture allows easy VLSI implementation, and minimizes the input data bandwidth. The performance is also analyzed in detail, and compared with those for other architectures.


international conference on quality software | 2007

White Box Pairwise Test Case Generation

Jangbok Kim; Kyunghee Choi; Daniel Hoffman; Gihyun Jung

Pairwise testing is an intuitive approach to test case generation, and has already seen use in commercial tools and practical applications. Pairwise testing is black box, in the sense that the test selection is independent of the internal structure of the system. We present a white box extension which selects additional test cases for the system based on specifications for one or more internal sub- operations. We have developed a novel algorithm for generating test cases for the full system which achieve pairwise coverage of the sub-operations. We have evaluated the algorithm using a case study, which indicates the practicality and effectiveness of the approach.


IEEE Transactions on Computers | 2001

Comment on "On-line scheduling policies for a class of IRIS real-time tasks"

Kyunghee Choi; Gihyun Jung

Scheduling policies for real-time tasks which receive rewards that depend on the amount of service received were presented by Dey et al.(1996). The policies utilized heuristic approaches to maximize the total accrued reward. In this comment, we propose an extension of their work that may reduce the average computational complexity.


asian simulation conference | 2004

Simulating session distribution algorithms for switch with multiple outputs having finite size queues

Jaehong Shim; Gihyun Jung; Kyunghee Choi

We propose and simulate session distribution algorithms for switch with multiple output links. The proposed algorithms try to allocate a new session to an output link in a fashion that output link utilization can be maximized but packet delay difference between sessions in a service class be minimized. The simulation proves that SCDF (Shortest Class Delay First) shows the best performance in terms of maximizing link utilization and balancing packet delay difference between sessions.


embedded and real-time computing systems and applications | 1996

Priority inversion handling in microkernel-based Real-Time Mike

Jaehong Shim; Kyunghee Choi; Gihyun Jung; Seung-Kyu Park; HyeonSik Shin; Dongyoon Kim

We propose a resource management model to avoid priority inversion problem that may occur when two tasks attempt to send service requests to a server task, and then the server task sends a request to another server task in a nested fashion. In this model we introduce two new concepts: job identifier inheritance and priority ceiling inheritance. We also suggest a new resource locking condition of the priority ceiling protocol for the computational model of the microkernel-based real-time system, called Mike, in which both IPC and synchronization are utilized and client/server communication model is frequently used in a nested fashion. To see the effectiveness, the proposed model has been implemented in Real-Time Mike developed previously. The implemented system shows that the resource management model efficiently prevents the priority inversion problem and avoids deadlock and multiple blocking.


intelligent data engineering and automated learning | 2004

An Intelligent Topic-Specific Crawler Using Degree of Relevance

Sanguk Noh; Young-Soo Choi; Haesung Seo; Kyunghee Choi; Gihyun Jung

It is indispensable that the users surfing on the Internet could have web pages classified into a given topic as correct as possible. Toward this ends, this paper presents a topic-specific crawler computing the degree of relevance and refining the preliminary set of related web pages using term frequency/ document frequency, entropy, and compiled rules. In the experiments, we test our topic-specific crawler in terms of the accuracy of its classification, the crawling efficiency, and the crawling consistency. In case of using 51 representative terms, it turned out that the resulting accuracy of the classification was 97.8%.


IEEE Transactions on Consumer Electronics | 2003

An on-line frame scheduling algorithm for the Internet video conferencing

Jaehong Shim; Kangbin Yim; Kjrunghee Choi; Gihyun Jung

A window based on-line scheduling algorithm to efficiently distribute processor service time to tasks for processing image frames is proposed for the Internet video conferencing system. The algorithm lets the tasks share a limited service time in a manner that the overall quality of the conferencing system is maximized. A task for processing an image frame is modeled as an IRIS (increasing reward with increasing services) task and its reward is mapped into a strictly concave function. Based on the modeling and an observation that the tasks have a strong dependency in their execution order, the scheduler schedules only tasks in a small window at each scheduling instant. And the small window in which a few tasks are contained lets the algorithm have a very low computational complexity, which is a very important consideration for time constraint applications like the Internet conferencing system. Even with low complexity, the scheduler nearly maximizes the total accrued reward as obtained by an on-line optimal algorithm and enhances smooth display, which may be another important quality measure of the conferencing system. To evaluate the quality, three metrics are suggested and the performance of the proposed algorithm is measured in aspects of the metrics.


embedded and real-time computing systems and applications | 1998

Performance evaluation of on-line scheduling algorithms for imprecise computation

Jai-Hoon Kim; Kihyun Song; Kyung-Hee Choi; Gihyun Jung; Seunhun Jung

This paper presents an algorithm for scheduling imprecise tasks to minimize maximum error and analyzes its performance through intensive simulation. The imprecise computation is used to manage transient overload of computation. Each task for imprecise systems consists of a mandatory part and an optional part that can be skipped when systems are overloaded. The imprecise computation trades accuracy for meeting the deadline of tasks by skipping their optional parts. To increase accuracy for imprecise computation, we present a simple on-line scheduling algorithm that minimizes the maximum error. This algorithm executes mandatory parts of tasks first, then the optional parts in order to minimize maximum error. The proposed algorithm also increases schedulability by executing mandatory parts first. The proposed algorithm is simple and does not require any additional data structures such as the reservation list for maintaining mandatory parts.

Collaboration


Dive into the Gihyun Jung's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kangbin Yim

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Sanguk Noh

Catholic University of Korea

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge