Jang-Se Lee
Korea Maritime and Ocean University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jang-Se Lee.
congress of the italian association for artificial intelligence | 2003
Sung-Do Chi; Ye-Hwan Lim; Jong-Keun Lee; Jang-Se Lee; Soochan Hwang; Byung-Heum Song
The objective of this paper is to design and develop the efficient decision support system for forest managers that would help them in their decision-making tasks during the forest fire. To do this, we have adopted the advanced simulation techniques as well as the genetic algorithm for generating the forest fire fighting strategy. The GIS database with 3-D graphics has been also employed for supporting the decision-making. In order to coherently represent the geographical, meteorological, and forest information as well as to generate the fire model and simulation trajectory of the fire spread, the cellular modeling approach has been proposed. Various resources and their organizations model for the fire fighting can be efficiently represented by using the rule-based system entity structure and each resource organizations can be directly evaluated by employing the simulation-based genetic algorithm. Several simulation tests performed on a sample forest area will demonstrate our techniques.
international conference on information and communication security | 2001
Jong Sou Park; Jang-Se Lee; Hwan Kuk Kim; Jeong-rye Jeong; Dong-Bok Yeom; Sung-Do Chi
The cyber attack simulation tool, SECUSIM, is presented for specifying attack mechanisms, verifying defense mechanisms, and evaluating their consequences. The tool has been successfully developed by employing the advanced modeling and simulation concepts such as SES/MB (System Entity Structure / Model Base) framework, DEVS (Discrete Event System Specification) formalism, and experimental frame. SECUSIM is currently implemented on the basis of Visual C++ and enables a simulation of twenty attack scenarios against hundreds network components.
Ai & Society | 2004
Jong-Keun Lee; Min-Woo Lee; Jang-Se Lee; Sung-Do Chi; Syng-Yup Ohn
The major objective of this paper is to propose the automated cyber-attack scenario generation methodology based on the symbolic simulation environment. Information Assurance is to assure the reliability and availability of information by preventing from attack. Cyber-attack simulation is one of noticeable methods for analyzing vulnerabilities in the information assurance field, which requires variety of attack scenarios. To do this, we have adopted the symbolic simulation that has extended a conventional numeric simulation. This study can 1) not only generate conventional cyber-attack scenarios but 2) generate cyber-attack scenarios still unknown, and 3) be applied to establish the appropriate defense strategies by analyzing generated cyber-attack. Simulation test performed on sample network system will illustrate our techniques.
Ai & Society | 2004
Jang-Se Lee; Jung-Rae Jung; Jong Sou Park; Sung-Do Chi
The major objective of this paper is to describe modeling on the linux-based system for simulation of cyber attacks. To do this, we have analyzed the Linux system from a security viewpoint and proposed the Linux-based system model using the DEVS modeling and simulation environment. Unlike conventional researches, we are able to i) reproduce the detail behavior of cyber-attack, ii) analyze concrete changes of system resource according to a cyber-attack and iii) expect that this would be a cornerstone for more practical application researches (generating cyber-attack scenarios, analyzing vulnerability and examining countermeasures, etc.) of security simulation. Several simulation tests performed on sample network system will illustrate our techniques.
australasian joint conference on artificial intelligence | 2005
Jang-Se Lee; Dong Seong Kim; Jong Sou Park; Sung-Do Chi
The objective of this paper is to propose an intelligent security management system using simulation based analysis, which is capable to monitor network status, evaluate vulnerabilities, generate defense strategies, and apply it to the network. To do this, we have employed the intelligent system design concept based on the advanced modeling and simulation environment for developing network security models and simulation-based evaluation of vulnerability as well as defense strategy. Our approach differs from others in that i) it is able to analyze vulnerabilities on node, link, and network in quantitative manner, ii) it can generate and apply defense strategies automatically, and iii) it supports a coherent design concept for intelligent security management system. A case study performed on a test bed will illustrate our techniques and demonstrate effectiveness of propose system.
workshop on information security applications | 2003
Sung-Do Chi; Jong Sou Park; Jang-Se Lee
Information assurance protects against a violation of information and its technologies that construct, operate and control information infrastructures, and assure the reliability and the availability of those. One of the efforts for information assurance is to build model of each computer and network system and perform the simulation to evaluate various threats to that model so that the vulnerability is estimated and optimal security policy can be generated. We argue about the need and difficulties of simulation in information assurance and suggest information assurance method using DEVS formalism, hierarchical & modular modeling and simulation environment, to solve the difficulties. The application and validity of suggested methodology will be proven through the vulnerability analysis method based on simulation and SECUSIM, which is a tool of training cyber-attack.
Archive | 2012
Yong-Jun You; Jang-Se Lee; Sung-Do Chi; Jae-Ick Kim
CGF (Computer Generated Forces) is known as a representation of constructive forces in a simulation environment which attempts to model human behavior. Currently, CGF deals with some extent on lower levels of command as well as weapon system, however, their behavior is stereotyped so as to support only simple level of decision-making. In this paper, we propose the level of agent-based CGF by integrating various viewpoints of requirements for supporting the systematic design.
Archive | 2003
Jong Sou Park; Sung-Do Chi; Hwan-kuk Kim; Jang-Se Lee; Jeong-rye Jeong
spring simulation multiconference | 2009
Sung-Do Chi; Yong-Jun You; Chan-Ho Jung; Jang-Se Lee; Jae-Ick Kim
Journal of the Korea Society for Simulation | 2008
Sung-Do Chi; Yong-Jun You; Chan-Ho Jung; Jang-Se Lee; Jae-Ick Kim