Kwang-Sun Ko
Sungkyunkwan University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kwang-Sun Ko.
international conference on computational science and its applications | 2006
Kwang-Sun Ko; Gu Su Kim; June Kim; JungHyun Han; Ungmo Kim; Young Ik Eom
Recently, demands on security frameworks adopted for network-based storage mechanisms have considerably increased, as these mechanisms are appointed in important roles within industrial areas. However, there has been minimal research and development of these frameworks. In this paper, the design and implementation of a security framework, based on the Object-based Storage Device (OSD) standard [1], is presented. In the proposed security framework compared with the OSD standard, several different functionalities exist.
computational intelligence and security | 2005
Kwang-Sun Ko; Insook Jang; Yong-hyeog Kang; Jinseok Lee; Young Ik Eom
Although studies regarding the classification and analysis of source-level vulnerabilities in operating systems are not direct and practical solutions to the exploits with which computer systems are attacked, it is important that these studies supply the elementary technology for the development of effective security mechanisms. Linux systems are widely used on the Internet and in intra-net environments. However, researches regarding the fundamental vulnerabilities in the Linux kernel have not been satisfactorily conducted. In this paper, characteristic classification and correlation analysis of source-level vulnerabilities in the Linux kernel, open to the public and listed on the SecurityFocus site for the 6 years from 1999 to 2004, are presented. This study will enable Linux kernel maintenance groups to understand the wide array of vulnerabilities, to analyze the characteristics of the attack abusing vulnerabilities, and to prioritize their development effort according to the impact of these vulnerabilities on the Linux systems.
The Kips Transactions:parta | 2007
Young-Woo Jung; Jung-Hwan Choi; Kwang-Sun Ko; Gu-Su Kim; Young Ik Eom
In multi agent systems, various inter agent communication models have been proposed, and, especially, there are several group communication schemes proposed so far, where some schemes guarantees transparent communication among the agents. However, in mobile agent environments, we require new group communication schemes that consider topology changes caused by mobile agent migrations. Also, these group communication schemes should be secure in order for them to be practical. In this paper, we propose a secure group communication scheme using the hierarchical overlay ring structure of mobile agents. The proposed scheme uses the ring channel in order to cope adaptively with the change of ring topology. The ring channel has basic information for construction of the ring and is managed only by the mobile agent platforms. Therefore, each mobile agent need not directly handle the ring channel and it can perform group communication without any consideration on the change of the ring topology.
international symposium on computer and information sciences | 2004
Kwang-Sun Ko; Eun-kyung Cho; Taekeun Lee; Yong-hyeog Kang; Young Ik Eom
Recently various hacking tools that dig out the vulnerabilities of hosts on a network are easily accessible through the Internet, and large-scale network attacks have been increased during last decades. To detect these network attacks, a variety of schemes are developed by several companies and organizations. But, many previous schemes are known to have some weakness in protecting important hosts from network attacks because of their inherent unconditional filtering mechanisms. This means that they unconditionally filter out doubtful network traffic in spite of its being normal network traffic. Therefore, to filter out only abnormal network traffic, step-by-step filtering capabilities are required. In this paper, we propose a framework for controlling abnormal network traffic. This framework is implemented through the CBQ and iptables mechanisms in Linux kernel.
The Kips Transactions:partb | 2008
Jae-Hwan Jung; Hyunsu Jang; Kwang-Sun Ko; Gu-Su Kim; Young Ik Eom
ABSTRACT With the growing proliferation of mobile computing devices, several industrial and academic research groups have a vigorous studying to remote control for various appliances with mobile devices such as Notebooks, PDAs, and Smartphones in home network environments. We can utilize the good points of mobile devices such as portability and usability so that we can remote control and manage the mobile devices connected on home networks anytime, anywhere. However, mobile devices use different languages. Therefore, they cause some problems because their interfaces and the methods of operation are different each other. To solve these problems, there are two consideration. First, we may be solved development of the user interface and difficulty of maintenance in order to control various heterogeneous devices. Second, we may provide the user interface which is dynamically adapting users preferences and device characteristics. To satisfy these considerations, we describe the design of an adaptive user interface for home network environments using the UIML (User Interface Markup Language) based on XML (eXtensible Markup Language) and the profile information of the user and device. Therefore, we present several implementation examples that show how the framework can form the basis of prototypical applications.Key Words:User Interface, UIML, Profile, Transcoder, Mapping Rule
international conference on conceptual structures | 2007
Kwang-Sun Ko; Seong-Goo Kang; Gyehyeon Gyeong; Young Ik Eom
In this paper, a protocol, called recursive priority inheritance (RPI) protocol, is proposed to solve complicated priority inversion problems as well as basic one. Our proposed protocol is implemented and tested in the Linux kernel. Additionally, the performance of our proposed protocol is evaluated and compared with previous protocols in the aspect of time and space complexity analyses.
The Kips Transactions:parta | 2006
Seong-Goo Kang; Gyehyeon Gyeong; Kwang-Sun Ko; Young Ik Eom
Real-time operating systems have been used in various computing environments, where a job must be completed in its deadline, with various conditions, such as effective scheduling policies, the minimum of an interrupt delay, and the solutions of priority inversion problems, that should be perfectly satisfied to design and develop optimal real-time operating systems. Up to now, in order to solve priority inversion problems among several those conditions. There have been two representative protocols: basic priority inheritance protocol and priority ceiling emulation protocol. However, these protocols cannot solve complicated priority inversion problems. In this paper, we design a protocol, called recursive priority inheritance (RPI), protocol that effectively solves the complicated priority inversion problems. Our proposed protocol is also implemented in the Linux kernel and is compared with other existing protocols in the aspect of qualitative analysis.
Archive | 2008
Young Ik Eom; Kwang-Sun Ko; Hyunsu Jang; Hyunjin Cho; Yongwoo Jung; Hyunwoo Choi; Gyehyeon Gyeong; Jung-Hwan Choi; Zhen Zhao; Taehyoung Kim; Youn-Woo Kim
Archive | 2007
Young Ik Eom; Ka Eul Kim; Kwang-Sun Ko; Gyehyeon Gyeong; Seoung Goo Kang; Yong-Hyeog Kang; Hyunjin Cho; Hyunsu Jang; Yong Woo Jung; Hyunwoo Choi
The Kips Transactions:partc | 2008
Jaeyoung Shin; Young-Woo Jung; Kwang-Sun Ko; Young Ik Eom