Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ikkyun Kim is active.

Publication


Featured researches published by Ikkyun Kim.


computer science and its applications | 2008

PE File Header Analysis-Based Packed PE File Detection Technique (PHAD)

Yangseo Choi; Ikkyun Kim; Jintae Oh; Jae-cheol Ryou

In order to conceal malware, malware authors use the packing and encryption techniques. If the malware is packed or encrypted, then it is very difficult to analyze. Therefore, to prevent the harmful effects of malware and to generate signatures for malware detection, the packed and encrypted executable codes must initially be unpacked. The first step of unpacking is to detect the packed executable files. In this paper, a packed file detection technique (PHAD) based on a PE header analysis is proposed. In many cases, to pack and unpack the executable codes, PE files have unusual attributes in their PE headers. In this paper, these characteristics are utilized to detect the packed files. a characteristic vector (CV) that consists of eight elements is defined, and the Euclidean distance (ED) of the CV is calculated. The EDs of the packed files are calculated and represent the base threshold for the detection of packed files.


workshop on information security applications | 2012

AIGG Threshold Based HTTP GET Flooding Attack Detection

Yangseo Choi; Ikkyun Kim; Jintae Oh; Jongsoo Jang

Distributed denial-of-service (DDoS) attacks still pose unpredictable threats to the Internet infrastructure and Internet-based businesses. As the attackers focus on economic gain, the HTTP GET Flooding attacks against the business web servers become one of the most frequently attempted attacks. Furthermore, the attack is becoming more sophisticated. In order to detect those attacks, several algorithms are developed. However, even though the developed technologies can detect the sophisticated attacks some of them need lots of system resources [12,13]. Sometimes due to the time consuming processes the whole performance of DDoS defense systems is degraded and it becomes another problem. For that, we propose a simple threshold based HTTP GET flooding attack detection algorithm. The threshold is generated from the characteristics of HTTP GET Request behaviors. In this algorithm, based on the defined monitoring period (MP) and Time Slot (TS), we calculate the Average Inter-GET_Request_Packet_Exist_TS-Gap (AIGG). The AIGG is used for threshold extraction. For effective detection, the optimized MP, TS and the threshold value, are extracted. In addition, the proposed algorithm doesn’t need to analyze every HTTP GET request packet so it needs less CPU resources than the algorithms which have to analyze all the request packets.


The Journal of Supercomputing | 2017

DTB-IDS: an intrusion detection system based on decision tree using behavior analysis for preventing APT attacks

Daesung Moon; Hyungjin Im; Ikkyun Kim; Jong Hyuk Park

Due to rapid growth of communications and networks, a cyber-attack with malicious codes has been coming as a new paradigm in information security area since last few years. In particular, an advanced persistent threats (APT) attack is bringing out big social issues. The APT attack uses social engineering methods to target various systems for intrusions. It breaks down the security of the target system to leak information or to destroy the system by giving monetary damages on the target. APT attacks make relatively simple attacks such as spear phishing during initial intrusion but a back door is created by leaking the long-term information after initial intrusion, and it transmits the malicious code by analyzing the internal network. In this paper, we propose an intrusion detection system based on the decision tree using analysis of behavior information to detect APT attacks that intellectually change after intrusion into a system. Furthermore, it can detect the possibility on the initial intrusion and minimize the damage size by quickly responding to APT attacks.


Cluster Computing | 2017

A survey of deep learning-based network anomaly detection

Donghwoon Kwon; Hyunjoo Kim; Jinoh Kim; Sang C. Suh; Ikkyun Kim; Kuinam J. Kim

A great deal of attention has been given to deep learning over the past several years, and new deep learning techniques are emerging with improved functionality. Many computer and network applications actively utilize such deep learning algorithms and report enhanced performance through them. In this study, we present an overview of deep learning methodologies, including restricted Bolzmann machine-based deep belief network, deep neural network, and recurrent neural network, as well as the machine learning techniques relevant to network anomaly detection. In addition, this article introduces the latest work that employed deep learning techniques with the focus on network anomaly detection through the extensive literature survey. We also discuss our local experiments showing the feasibility of the deep learning approach to network traffic analysis.


asia pacific network operations and management symposium | 2007

A practical approach for detecting executable codes in network traffic

Ikkyun Kim; Koohong Kang; Yangseo Choi; Dae Won Kim; Jintae Oh; Kijun Han

The research on the detection of zero-day network attack and the signature generation is highlighted as an issue according to the outbreak of the new network attack is faster than a prediction. In this paper, we propose a very practical method that detects the executable codes within the network packet payload. It could be used as the key function of the signature generation against the zero-day attack or the high speed anomaly detection. The proposed heuristic method in this paper could be expressed in terms of visually classifying the characteristic of the instruction pattern of executable codes. And then we generalize this by applying the discrete parameter Markov chain. Our experimental study showed that the presented scheme could find all types of executable codes in our experiments.


workshop on information security applications | 2012

Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks

Hyunjoo Kim; Byoung-Koo Kim; Dae Won Kim; Ikkyun Kim; Tai-Myoung Chung

Distributed Denial-of-Service (DDoS) attacks are made in such a way that a plurality of zombie computers infected with malicious code simultaneously makes Denial-of-Service (DoS) attacks. These DDoS attacks still dominate the ranking of cyber threats. It is a great challenge to accurately detect and intercept the DDoS attacks on high speed network. Most of all, HTTP GET flooding attacks increase day by day. Therefore, we propose the web server protection scheme against HTTP GET flooding attacks. The proposed technique easily can detect HTTP GET flooding attacks. Most of all, it was implemented in our Gigabit Ethernet Secure Network Interface Controller (GESNIC) for the high performance DDoS prevention. Our GESNIC let IT administrators protect their Internet servers against various DDoS attacks. GESNIC provides the high performance secure logics, which is a kind of security offload engine against TCP and HTTP related DDoS attacks on network interface card. Besides, the secure offload engine has robustness against various DDoS attacks itself and it is independent on server’s OS and external network configuration. Its performance is almost a carrier-class level as latency time of 7x10 −6 seconds. In summary, installing our GESNIC can make the more secure, highly available, and easier to manage - which is exactly the kind of innovation.


IEICE Transactions on Information and Systems | 2008

Tracing Stored Program Counter to Detect Polymorphic Shellcode

Dae Won Kim; Ikkyun Kim; Jintae Oh; Jongsoo Jang

The shellcode use of the polymorphic form has become active as the de facto method for avoiding signature based network security system. We present a new static analysis method for detecting the decryption routine of the polymorphic shellcode. This method traces the processes by which the decryption routine stores the current program counter in a stack, moves the value between registers and uses the value in order to make the address of the encrypted code accessible. Most of decryption routines have the feature which they use the program counter stored on a stack as the address for accessing the memory that the encrypted code is positioned.


international conference on computational science and its applications | 2004

Design and Implementation of High-Performance Intrusion Detection System

Byoung-Koo Kim; Ikkyun Kim; Ki-Young Kim; Jongsoo Jang

The fast extension of inexpensive computer networks has increased the problem of unauthorized access and tampering with data. As a response to increased threats, many Network-based Intrusion Detection Systems (NIDSs) have been developed, but current NIDSs are barely capable of real-time traffic analysis on Fast Ethernet links. As network technology presses forward, Gigabit Ethernet has become the actual standard for large network installations. Therefore, there is an emerging need for security analysis techniques that can keep up with the increased network throughput. We have made effort to design and implement high-speed IDS that is run as a lower branch of our system named ‘Network Security Control System (NSCS)’. Our IDS named ‘Security Gateway System (SGS)’ has a pattern matching approach through the FPGA (Field Programmable Gate Array) logic and kernel logic as detection mechanism that can be applied to Gigabit-Ethernet links. In this paper, we briefly introduce the whole architecture of our system designed to perform intrusion detection on high-speed links. And then, we present the efficient detection mechanism that is run by cooperation of FPGA logic and kernel logic. In other words, we focus on the network intrusion detection mechanism applied in a lower branch of our system.


MUSIC | 2014

Analysis of Cyber Attacks and Security Intelligence

Youngsoo Kim; Ikkyun Kim; Namje Park

A cyber attack is deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyber attacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft. Cyber attack is also known as a computer network attack (CNA). Cyber attacks occurred targeting banks and broadcasting companies in South Korea on March 20. The malware involved in these attacks brought down multiple websites and interrupted bank transactions by overwriting the Master Boot Record (MBR) and all the logical drives on the infected servers rendering them unusable. It was reported that 32,000 computers had been damaged and the exact amount of the financial damage has not yet been calculated. More serious is that we are likely to have greater damages in case of occurring additional attacks, since exact analysis of cause is not done yet. APT(Advanced Persistent Threat), which is becoming a big issue due to this attack, is not a brand new way of attacking, but a kind of keyword standing for a trend of recent cyber attacks. In this paper, we show some examples and features of recent cyber attacks and describe phases of them. Finally, we conclude that only the concept of security intelligence can defend these cyber threats.


symposium on applications and the internet | 2008

Function Call Mechanism Based Executable Code Detection for the Network Security

Dae Won Kim; Yangseo Choi; Ikkyun Kim; Jintae Oh; Jongsoo Jang

The general method in which attackers obtain the control authority of the remote host is through the exploit code. Motivated by the viewpoint that the exploit code normally contains some executable codes, we propose a method of detecting the executable codes included in packets for the network security. Because some parts in the executable codes essentially include the function call related instruction patterns, we propose an approach detecting the instruction patterns following the function call mechanism. We have implemented a prototype and evaluated it against a variety of the executable and non-executable codes. The results show that the proposed method properly classifies the executable and non-executable codes.

Collaboration


Dive into the Ikkyun Kim's collaboration.

Top Co-Authors

Avatar

Yangseo Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jintae Oh

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jongsoo Jang

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jooyoung Lee

Korea Institute for Advanced Study

View shared research outputs
Top Co-Authors

Avatar

Byoung-Koo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Dae Won Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hyunjoo Kim

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Sunoh Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Koohong Kang

Pohang University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge