Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hee Suk Seo is active.

Publication


Featured researches published by Hee Suk Seo.


Wireless Personal Communications | 2011

Routing Protocol for Heterogeneous Hierarchical Wireless Multimedia Sensor Networks

Jin Myoung Kim; Hee Suk Seo; Jin Kwak

Recently, wireless multimedia sensor networks (WMSNs) have emerged as one of the most important technologies, driven by the development of powerful multimedia device such as CMOS. WMSNs require several factors such as resource constraints, specific QoS, high bandwidth and so on. In this paper, we propose a hierarchical heterogeneous network model based routing protocol for WMSNs. In our proposal, proposed network model is classified into monitoring class, delivery class and aggregation class. Also we define two kinds of the routing path in order to ensure bandwidth and QoS. In simulation results, we illustrate the performance of our proposal.


australian joint conference on artificial intelligence | 2002

Modeling and Simulation for Detecting a Distributed Denial of Service Attack

Hee Suk Seo; Tae Ho Cho

The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of any one system to deal with the intrusions. This paper shows a modeling and simulation of network security in which the multiple IDSes (Intrusion Detection System) and a firewall coordinate by sharing attackers information for the effective detection of the intrusion. Another characteristic in the proposed simulation is the composition of a real intrusion by generating nonabstracted intrusion packets and, accordingly, the construction of nonabstracted version of IDS and firewall model components.


Simulation Modelling Practice and Theory | 2003

An application of blackboard architecture for the coordination among the security systems

Hee Suk Seo; Tae Ho Cho

Abstract The paper describes the design and implementation of a security architecture for a coordination information system constructed by blackboard architecture (BBA). The need arises for systems to coordinate with one another, to manage diverse attacks across networks and time. The coordination issue is the essential problem since it is beyond the scope of any one intrusion detection system (IDS) to deal with the intrusions. This paper shows a modeling and simulation of network security in which the multiple IDSes and a firewall coordinate by sharing attacker’s information for the effective detection of the intrusion. Another characteristic in the proposed simulation is the composition of a real intrusion by generating non-abstracted intrusion packets and, accordingly, the construction of non-abstracted version of IDS and firewall model components that are closely related to the intrusion packets.


australian joint conference on artificial intelligence | 2001

Simulation of Network Security with Collaboration among IDS Models

Hee Suk Seo; Tae Ho Cho

IDS (Intrusion Detection System) plays a vital role in network security in that it monitors system activities to identity unauthorized use, misuse or abuse of computer and network system. For the simulation of IDS a model has been constructed based on the DEVS (Discrete EVent system Specification) formalism. With this model we can simulate whether the intrusion detection, which is a core function of IDS, is effectively done under various different conditions. As intrusions become more sophisticated, it is beyond the scope of any one IDS to deal with them. Thus we placed multiple IDS agents in the network where the information helpful for detecting the intrusions is shared among these agents to cope effectively with attackers. Each agent cooperates through the BBA (Black Board Architecture) for detecting intrusions. If an agent detects intrusions, it transfers attackers information to a Firewall. Using this mechanism attackers packets detected by IDS can be prevented from damaging the network.


Simulation Modelling Practice and Theory | 2006

Network security agent DEVS simulation modeling

Hee Suk Seo

Abstract Networks are exploding in scale, while their costs are plummeting, and as new applications are rapidly deployed to consume these vast new networking resources, security is becoming of paramount importance. Policy-based Internet management approaches are moving closer to maturity. Configuring a large number of routers, bridges, or servers using generic rules instead of individual configuration appears to be less complex, less error-prone and more flexible. This paper describes the design and modeling of network security agents based on policy-based framework, which has some inherent merits. The need arises for systems to coordinate with one another, to manage a range of malicious attacks across networks at any time. We performed modeling of the network components that include an intrusion detection system, firewall, single sign-on technology, and policy-based framework. The authentication for the network system access is achieved using single sign-on technology. We present modeling methodology for network security agents, which are identified as a component of policy-based network management. Each component is implemented as a hybrid design utilizing modeling concepts from Discrete EVent system Specification (DEVS) formalism and problem-solving concepts from BlackBoard Architecture (BBA) of Artificial Intelligence (AI).


BioMed Research International | 2013

A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

Seung-Hwan Ju; Hee Suk Seo; Sunghyu Han; Jae-Cheol Ryou; Jin Kwak

The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the users fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.


Journal of Internet Technology | 2013

Study on Analysis Methodology for Android Applications

Seung-Hwan Ju; Hee Suk Seo; Jin Kwak

The advance in technology brought us mobile phones with almost the same power and features as our personal computers. Something that criminal minds will find a way to exploit for their gain as the history has shown. The main contents of the information paradigm are the ”open” and ”standard.” Full security incidents account for more than 80 percent of the internal information security incidents (abuse of information resources and information leakage, etc.), damages the value of information assets has increased rapidly. Mobile malware is rapidly becoming a serious threat. In this paper, I survey the current state of mobile malware. As I classified according to behavioral characteristics and propagation and understood the history mobile evolution. Also, I present Android Application analysis methodology for the more securing smart-work environment.


Electronic Commerce Research | 2013

The prediction of network efficiency in the smart grid

Sung-Min Jung; Tae-Kyung Kim; Hee Suk Seo; Seung-Jae Lee; Jin Kwak

AMI is the core infrastructure of a smart grid and it is expected to be used for many industrial fields. The components of AMI generally include a smart meter, DCU, and MDMS. In such a system, the smart meter measures power consumption and DCU collects information from smart meters and send their data to MDMS. The MDMS is an end server to get information of the power usage and store its log and data. Since there are a lot of devices such as smart meters and DCUs in AMI, it is important to maintain the suitable number of them. In particular, it is necessary to calculate the proper number of DCUs for efficient management of AMI. In this paper, we suggest a way to predict the proper number of DCUs and this proposed method is useful to predict the total performance of heterogeneous AMI. The simulation results show that AMI is greatly influenced by the difference of performance between DCUs in the heterogeneous AMI.


Iet Communications | 2009

Job partition and allocation using the prediction model in non-dedicated heterogeneous wireless network environments

T.-K. Kim; Jong Hyuk Park; Sang-Soo Yeo; Hee Suk Seo; Jin Kwak

Adapting wireless devices to communicate within grid networks empower users. This makes deployment of a wide range of applications possible within appropriate limits, including intermittent network connectivity and non-dedicated heterogeneous system capacity. The performance prediction model is used to improve the performance of the mobile grid job scheduling algorithm (MG-JSA). The proposed algorithm predicts the response time for processing the distributed application in each mobile node, although considering wireless network environments and inherent non-dedicated heterogeneous system capacity. Using this prediction model, the algorithm partitions and allocates the distributed jobs to available mobile nodes for rapid job processing. The efficiency of the MG-JSA model is demonstrated by evaluating its performance.


international conference on intelligent computing | 2006

Modeling of distributed intrusion detection using fuzzy system

Hee Suk Seo; Taekyung Kim; Hyung-Jong Kim

Application of agent technology in Intrusion Detection Systems (IDSs) has been developed. Intrusion Detection (ID) agent technology can bring IDS flexibility and enhanced distributed detection capability. The security of the ID agent and methods of collaboration among ID agents are important problems noted by many researchers. This paper applies fuzzy logic to reduce the false positives that represent one of the core problems of IDS. ID is a complicated decision-making process, generally involving enormous factors regarding the monitored system. A fuzzy logic evaluation component, which represents a decision agent model of in distributed IDSs, considers various factors based on fuzzy logic when an intrusion behavior is analyzed. The performance obtained from the coordination of an ID agent with fuzzy logic is compared with the corresponding non-fuzzy type ID agent.

Collaboration


Dive into the Hee Suk Seo's collaboration.

Top Co-Authors

Avatar

Jin Kwak

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar

Seung-Hwan Ju

Korea University of Technology and Education

View shared research outputs
Top Co-Authors

Avatar

Tae Ho Cho

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Sunghyu Han

Korea University of Technology and Education

View shared research outputs
Top Co-Authors

Avatar

Jong Hyuk Park

Seoul National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bong-Nam Noh

Chonnam National University

View shared research outputs
Top Co-Authors

Avatar

Hyeong-Ju Kang

Korea University of Technology and Education

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jae-Cheol Ryou

Chungnam National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge