Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kyung-Sook Lee is active.

Publication


Featured researches published by Kyung-Sook Lee.


international workshop on variable structure systems | 2008

Design and Evaluation of a Dynamic Continuous Media Streaming Supporting Method on the Basis of Logical Grid Hierarchy for MANETs

Ihn-Han Bae; Kyung-Sook Lee

As wireless connectivity is integrated into many handheld devices, streaming multimedia content among mobile ad-hoc peers is becoming a popular application. In this paper, we propose a dynamic service replication algorithm for providing guaranteed continuous streaming services to all nodes in mobile ad-hoc networks (MANETs). First, a MANET is comprised of logical grid hierarchy, and a streaming service is replicated to a lower server region of the logical grid hierarchy by considering the link availability between a mobile node and the streaming server within a server region or the popularity of the streaming service. We evaluate analytically the performance of the proposed algorithm, and compared with that of existing Qins algorithm. Evaluation results show that our algorithm can achieve better streaming performance than Qins algorithm. Therefore, the proposed algorithm not only improves the sharing availability of replicated streaming services but also controls efficiently the number of streaming service replications.


fuzzy systems and knowledge discovery | 2007

Design and Evaluation of a Dynamic Anomaly Detection Scheme Using the Age of User Profiles

Ihn-Han Bae; Hwa-Ju Lee; Kyung-Sook Lee

The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the use pattern of a mobiles user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by using a simulation.


international conference on hybrid information technology | 2009

A weighted-dissimilarity-based anomaly detection method for mobile networks

Hwa-Ju Lee; Kyung-Sook Lee; Ihn-Han Bae

Mobile wireless networks continue to be plagued by theft of identity and intrusion. Both problems can be addressed in two different ways, either by misuse detection or anomaly-based detection. In this paper, we propose a weighted-dissimilarity-based anomaly detection method that can effectively identify abnormal behavior such as mobility patterns of mobile wireless networks. In the proposed algorithm, a normal profile is constructed from normal mobility patterns of mobile nodes in mobile wireless networks. From the constructed normal profile, the dissimilarity is computed by a weighted dissimilarity measure. If the computed dissimilarity value is greater than the dissimilarity threshold that is a system parameter, an alert message is occurred. The performance of the proposed method is evaluated through a simulation. From the result of the simulation, we know that the proposed method is superior to the performance of anomaly detection methods using other dissimilarity measures.


The Kips Transactions:partc | 2004

A Pointer Forwarding Scheme for Fault-tolerant Location Management in Mobile Networks

Kyung-Sook Lee; Sook-Jeong Ha; Sung-Kwang Chun; Ihn-Han Bae

One of the main challenges in personal communication services(PCS ) Is to locate many mobile terminals that nay move from place to place frequently. This kind of system operation is called location management. This task entails sophisticated signaling traffic and database queries. Several strategies have been proposed to improve the efficiency of location management. These strategies use location register databases to store the current locations of mobile terminals, and are vulnerable to failure of the location register databases. In this paper, we propose a fault-tolerant pointer forwarding scheme with distributed home location register in order to tolerate the failure of location registers. The performance of the proposed scheme is evaluated analytically by simulation, and Is compared with Biaz`s bypass forwarding strategy and two-path forwarding strategy.


International Journal of Knowledge-based and Intelligent Engineering Systems | 2007

Design and evaluation of a rough set-based anomaly detection scheme considering weighted feature values

Ihn-Han Bae; Hwa-Ju Lee; Kyung-Sook Lee


international conference on wireless communications, networking and mobile computing | 2008

Design and Evaluation of a Hierarchical Service Management Method using Bloom Filters for Large MANETs

Ihn-Han Bae; Kyung-Sook Lee


software engineering research and applications | 2007

Practical Patching for Efficient Bandwidth Sharing in VOD Systems

Kyung-Sook Lee; Sook-Jeong Ha; Ihn-Han Bae


Journal of Korea Multimedia Society | 2006

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering Weighted Feature Values

Ihn-Han Bae; Hwa-Ju Lee; Kyung-Sook Lee


Journal of Korea Multimedia Society | 2005

Dynamic Hybrid Patching for the Efficient Use of VOD Server's Network-I/O Bandwidth

Sook-Jeong Ha; Kyung-Sook Lee; Jin-Gyu Kim


The Kips Transactions:partb | 2001

Design and Evaluation of a Reservation-Based Hybrid Disk Bandwidth Reduction Policy for Video Servers

Sun-Jin Oh; Kyung-Sook Lee; Ihn-Han Bae

Collaboration


Dive into the Kyung-Sook Lee's collaboration.

Top Co-Authors

Avatar

Ihn-Han Bae

Catholic University of Daegu

View shared research outputs
Top Co-Authors

Avatar

Hwa-Ju Lee

Catholic University of Daegu

View shared research outputs
Top Co-Authors

Avatar

Sook-Jeong Ha

Kyungpook National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge