Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jong Sou Park.
cluster computing and the grid | 2005
Khin Mi Mi Aung; Kiejin Park; Jong Sou Park
While traditional security mechanisms rely on preventive controls and those are very limited in surviving malicious attacks, we propose a novel approach of the security issue to cluster recovery. In this paper, we present the cluster recovery model with a software rejuvenation methodology, which is applicable in security field. We propose two formal approaches, stochastic and Markov decision process. And we estimate the possibility of surviving under unknown attacks. The basic idea of rejuvenation is to investigate the consequences for the exact respond time in face of attacks and rejuvenating the running software/service, refresh its internal state, and resume or restart it. These actions deter the intruders progress, prevent from more serious damages and provide time to perform more detailed analysis.
computer and information technology | 2010
Shu Qin Ren; Khin Mi Mi Aung; Jong Sou Park
This paper proposes an enhanced privacypreserving data aggregation scheme, which balances the onerous task of extracting reasonable data value and preserving data privacy even with incomplete or malicious data presentence. We propose an innovative encryption algorithm to preserve data privacy while it can provide secure data comparison between the encrypted data. Furthermore, we define a robust and efficient aggregation operator to fuse the encrypted data without decryption by secure data comparison and density based data mining. The proposed aggregation scheme can remove both potentially malicious and redundant data before aggregation so that it can provide a robust aggregation result without scarifying data privacy. We also discuss the scheme performance in terms of aggregation accuracy, distribution recovery ability and aggregation efficiency. The experiment results show that this scheme can give reasonable aggregation values, recover the data distribution well even under 50% malicious readings, much more robust than the commonly used aggregation while it has good aggregation efficiency with above 80% redundant data removal.
cluster computing and the grid | 2006
Khin Mi Mi Aung; Kiejin Park; Jong Sou Park
Internet applications become increasingly widely used for millions of people in the world and on the other hand the accidents or disruptions of service are also dramatically increasing. Accidents or disruptions occur either because of disasters or because of malicious attacks. The disasters could not be completely prevented. Prevention is a necessary but not a sufficient component of disaster. In this case, we have to prepare thoroughly for reducing the recovery time and get the users back to work faster. In this paper, we present a cluster recovery model to increase the survivability level of Internet applications. We construct a state transition model to describe the behaviors of cluster systems. By mapping through recovery actions to this transition model with stochastic process, we capture system behaviors as well as we get mathematical steady-state solutions of that chain. We first carry out for steady-state behaviors leading to measures like steady-state availability. By transforming this model with the system states we compute a system measure, the mean time to repair (MTTR) and also compute probabilities of cluster systems failures due in face of disruptions. Our model with the recovery actions have several benefits, which include reducing the time to get the users back to work and making recovery performance insensitive to the selection of a failure treatment parameter.
international conference on intelligent computing | 2006
Shuqin Ren; Khin Mi Mi Aung; Jong Sou Park
Low-rate wireless personal area networks (LR-WPANs) are characterized by low power consumption, low cost, low computation and low rate, which are based on IEEE 802.15.4 and ZigBee standards. In this article, we first give an overview of the network structure, including its architecture, feasibility and functions. We also analyze several application scenarios with NS-2 simulator, and get some experiment results. For a better view of this kind of network, a preliminary performance evaluation is given according to the results, focusing on the beacon-enabled mode for star-topology and treetopology networks. Our performance evaluation study is to reveals the factors which affect network performance such as association, collision, packet delivery ratio and throughput under different superframe structures and traffic types.
international conference on algorithms and architectures for parallel processing | 2005
Khin Mi Mi Aung; Kiejin Park; Jong Sou Park
Even in an intrusion tolerant system, the resources will be fatigued if the intrusion is long lasting because of compromising iteratively or incrementally. In due course, the system will not provide even the minimum critical functionality. Thus we propose a model to increase the cluster system survivability level by maintaining the essential functionality. In this paper, we present the cluster recovery model with a software rejuvenation methodology, which is applicable in security field and also less expensive. Firstly, we perform the steady-state analysis of a cluster system and then study the 4th Generation Security Mechanism: Restore system with cold standby cluster. The basic idea is investigate the consequences for the exact responses in face of attacks and rejuvenate the running software or/and service, or/and reconfigure it. It shows that the system operates through intrusions and provides continued the critical functions, and gracefully degrades non-critical system functionality in the face of intrusions.
high performance computing and communications | 2005
Khin Mi Mi Aung; Kiejin Park; Jong Sou Park; Howon Kim; Byung-Gil Lee
Denial of service attacks (DoS) don’t necessarily damage data directly, or permanently but intentionally compromise the functionality. Even in an intrusion tolerant system, the resources will be fatigued if the intrusion is long lasting because of compromising iteratively or incrementally. In due course, the system will not provide even the minimum critical functionality. Thus we propose a model to increase the cluster system survivability level by maintaining the essential functionality. In this paper, we present the cluster recovery model with a software rejuvenation methodology, which is applicable in security field and also less expensive. The basic idea is – investigate the consequences for the exact responses in face of attacks and rejuvenate the running software/service, or/and reconfigure it. It shows that the system operates through intrusions and provides continued the critical functions, and gracefully degrades non-critical system functionality in the face of intrusions.
International Journal of Network Security | 2006
Khin Mi Mi Aung; Kiejin Park; Jong Sou Park
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failures and moreover we cannot prevent all faults and attacks. In this paper, we analyze a cluster systems ability to maintain the critical services even in face of faulty and intrusions with 4th Generation Security Mechanism: Regeneration. The experiments have been demonstrated that the proposed mechanism can be used to analyze and proactively manage the effects of cluster network faults and attacks, and restore accordingly. The survivability level is greatly enhanced by the addition of functionality to targeted systems while maintaining the critical service and avoiding large incremental costs.
international conference on asian digital libraries | 2005
Khin Mi Mi Aung; Kiejin Park; Jong Sou Park
Current intrusion detection mechanisms have quite low detection and high false alarm rates. Thus we propose a model of intrusion tolerant system (ITS) to increase the survivability level from the successful attacks. In this paper, we present the cluster recovery model using cold standby cluster with a software rejuvenation methodology, which is applicable in security field and also less expensive. Firstly, we perform the steady state analysis of a cluster system and then consider an ITS with cold standby cluster. The basic idea is – investigate the consequences for the exact responses in face of attacks and rejuvenate the running service or/and reconfigure it. It shows that the system operates through intrusions and provides continued the critical functions, and gracefully degrades non-critical system functionality in the face of intrusions.
international conference on computational science and its applications | 2004
Khin Mi Mi Aung; Jong Sou Park
While traditional security mechanisms rely on preventive controls and those are limited in surviving malicious attacks, we propose a novel approach to security engineering. The objective is to characterize the attacks in real time and survive in face of attacks by using software rejuvenation. In this paper we address the critical intrusion tolerance problems ahead of intrusion detection. Firstly, the attacks are characterized by applying Principle Component Analysis (PCA) and these characterized intrusions are analyzed according to their state changes by utilizing transient state analysis. Subsequently, the software rejuvenation methods are performed by killing the intruders’ processes in their tracks, halting abuse before it happens, shutting down unauthorized connection, and responding and restarting in real time. These slogans will really frustrate and deter the attacks, as the attacker can’t make their progress. This is a way of survivability to increase the deterrence level against an attack in the target environment.
Ai & Society | 2004
Jong Sou Park; Khin Mi Mi Aung