Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jongil Jeong is active.

Publication


Featured researches published by Jongil Jeong.


computer science and its applications | 2008

Lawful Interception Scheme for Secure VoIP Communications Using TTP

Seokung Yoon; Jongil Jeong; Hyuncheol Jeong; Yoojae Won

This paper proposes lawful interception scheme for secure VoIP (Voice over IP) communications using TTP (Trusted Third Party). The proposed scheme is that TTP creates a master key and send it to VoIP terminals, and VoIP terminals create session keys for media traffic encryption using master key. TTP sends session key to law enforcement agency for decrypting encrypted media traffic. This scheme enables to do lawful interception and restrict the ability of law enforcement agency because the session key only validates during one session.


International Conference on Security Technology | 2008

VoIP SPAM Response System Adopting Multi-leveled Anti-SPIT Solutions

Jongil Jeong; Seokung Yoon; Tai-Jin Lee; Hyuncheol Jeong; Yoojae Won

VoIP spam will become severe problem preventing from generalization of VoIP service. For comprehensive response against spam, this paper implemented VoIP SPAM response system adopting multi-leveled anti-spam solutions. To adopt them, we divided VoIP service domains into three domains as outbound, intermediary, and inbound. The main goal of anti-spam solution in outbound domain is to prevent spam by monitoring and detecting call traffic of registered users. In intermediary domain, we focused on blocking SIP message forgery spam using SIP-based sender policy framework. Inbound domain has the “easy spam reporter”. This module enables victims to report spam contents to the administrator directly. The reported contents and information, of course, are shared with other domains as a black list. Through the experimental result, we showed this system is enough to prevent, detect, and block VoIP spam.


Archive | 2011

AUTOMATIC MANAGEMENT SYSTEM FOR GROUP AND MUTANT INFORMATION OF MALICIOUS CODES

Hong-Koo Kang; Chaetae Im; Joo-Hyung Oh; Jongil Jeong; Jin-kyung Lee; Byoung-Ik Kim; Hyun-Cheol Jeong; Seung-Goo Ji; Tai-Jin Lee


Archive | 2011

MALICIOUS CODE DETECTION AND CLASSIFICATION SYSTEM USING STRING COMPARISON AND METHOD THEREOF

Hyun-Cheol Jeong; Seung-Goo Ji; Tai Jin Lee; Jongil Jeong; Hong-Koo Kang; Byung-Ik Kim


Archive | 2011

DETECTION SYSTEM AND METHOD OF SUSPICIOUS MALICIOUS WEBSITE USING ANALYSIS OF JAVASCRIPT OBFUSCATION STRENGTH

Hyun-Cheol Jeong; Seung-Goo Ji; Tai Jin Lee; Jongil Jeong; Hong-Koo Kang; Byung-Ik Kim


Archive | 2011

SEED INFORMATION COLLECTING DEVICE AND METHOD FOR DETECTING MALICIOUS CODE LANDING/HOPPING/DISTRIBUTION SITES

Jongil Jeong; Chaetae Im; Joo-Hyung Oh; Hong-Koo Kang; Jin-kyung Lee; Byoung-Ik Kim; Seung-Goo Ji; Tai-Jin Lee; Hyun-Cheol Jeong


international conference on information networking | 2009

User reputation based VoIP spam defense architecture

Tai-Jin Lee; Jongil Jeong; Hyung-Jong Kim; HyunChul Jeong; Yoojae Won


Archive | 2012

A Study on the Automatic Malware Collecting System Based on the Searching Keyword

Byung-Ik Kim; Jongil Jeong; Hyun-Cheol Jeong


한국멀티미디어학회 국제학술대회 | 2010

Definition of Ontology Set for Detecting Malicious Web Sites

Jongil Jeong; Chaetae Im; Hyuncheol Jeong


international conference on new trends in information science and service science | 2010

A study on the tightening the security of the key management protocol (RFC4568) for VoIP

Seokung Yoon; Jongil Jeong; Hyuncheol Jeong

Collaboration


Dive into the Jongil Jeong's collaboration.

Top Co-Authors

Avatar

Yoojae Won

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ji-Yeon Kim

Seoul Women's University

View shared research outputs
Researchain Logo
Decentralizing Knowledge