Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Soo-Kyun Kim is active.

Publication


Featured researches published by Soo-Kyun Kim.


Security and Communication Networks | 2014

A model of analyzing cyber threats trend and tracing potential attackers based on darknet traffic

Sang-Soo Choi; Jungsuk Song; Seok-Hun Kim; Soo-Kyun Kim

In general, attackers carry out scanning or probing against a certain network when they start to attack their victims. Because of this, darknet is very useful to observe the scanning activities of attackers who want to find their victims that have security vulnerabilities in operating systems, applications, services, and so on. Thus, by observing and analyzing darknet traffic, it is able to obtain an insight into malicious activities that are happening on the Internet and to identify potential attackers who sent attack packets to the darknet. However, darknet has a fatal limitation that most of the darknet traffic has no payload data. This means that we cannot collect the real attack codes from the original darknet traffic. To cope with this problem, we propose a security monitoring and response model to analyze cyber threats trend and to trace potential attackers based on darknet traffic. We have evaluated the proposed model using one /24 darknet IP addresses and TMS alerts that were obtained from TMS. The experimental results provided the statistical information of all the incoming darknet traffic so that we could obtain the global cyber threats trend. Furthermore, the experimental results demonstrated that we could obtain malicious attack patterns and attack codes that were not detected by TMS. Copyright


Multimedia Tools and Applications | 2015

Multimedia applications for intelligent fusion computing

Soo-Kyun Kim; Fan Liu; Sang-Soo Choi

This special issue presents state-of-the-art research in the area of multimedia applications for Intelligent Fusion Computing. Multimedia data are used more and more widely and frequently in our daily life, e.g., 3D computer games, multimedia search, videoconferencing, visual telephone, YouTube, IPTV, IP Cam, video surveillance, etc. Recently, various intelligent fusion computing techniques have been invented, such as neural networks, fuzzy theory, evolutionary algorithm, and machine learning, which bring significant performance improvements to practical applications. For multimedia computing, these techniques can push applications closer to users’ semantic meanings, e.g., the semantic based multimedia retrieval and specific human action detection, etc. The goals of this special issue are to establish multimedia applications for intelligence fusion computing as a more prominent field of study and industry, and to exchange the latest discoveries on the strategic intelligence fusion that synergizes electronics, information media, hardware, control, human engineering, business, and industrial design to meet the social, technical demands of today’s society. By doing so, we hope to lay the groundwork for the sustainable growth of IT specialists and key industries through innovative fusion and communication between fields. The first paper entitled BAn Intelligent Parking Platform of Neighborhood EV for Autonomous Mobility Service^ (10.1007/s11042-014-1862-0) by Choi et al. suggests an architecture for an intelligent parking system that automatically maneuvers from a traffic lane to a designated battery-switching or recharging station supported by multimedia road servers and personal ITS station. This paper tests the spatial perception server and coordination server with sensors and devices to support that the modified EV can drive into a slot autonomously. By using this system, it’s possible to cut down air pollution and energy consumption from the transportation system by shortening waste time searching for an available slot. Multimed Tools Appl (2015) 74:3273–3276 DOI 10.1007/s11042-015-2459-y


Multimedia Tools and Applications | 2015

Line recognition algorithm for 3D polygonal model using a parallel computing platform

Ji Hun Kang; Shin Jin Kang; Soo-Kyun Kim

Line recognition-based rendering technique has been used effectively for shape transmission of 3D polygon model. Line recognition is defined by multifarious forms and characteristics of lines, and has been a fundamental key point in expressing shape of 3D polygon model in non-photorealistic rendering technique. Line recognition, however, requires a long period of calculation time and thus, various methods have been studied to accelerate the speed of the operation. This paper presents a new method that will accelerate the overall operation compared to the standard CPU-based method of extracting ink line. The new method will enhance the efficiency of the calculation speed by applying the parallel processing technique CUDA (Compute Unified Device Architecture) to the complex processes that consume a lot of time such as implicit surface calculation and feature point extraction. The overall performance will be tested and verified through various types of experiments with 3D polygon model.


Archive | 2015

Real-Time Visual Effects for Game Programming

Chang Hun Kim; Sun-Jeong Kim; Soo-Kyun Kim; Shin-Jin Kang

This book introduces the latest visual effects (VFX) techniques that can be applied to game programming. The usefulness of the physicality-based VFX techniques, such as water, fire, smoke, and wind, has been proven through active involvement and utilization in movies and images. However, they have yet to be extensively applied in the game industry, due to the high technical barriers. Readers of this book can learn not only the theories about the latest VFX techniques, but also the methodology of game programming, step by step. The practical VFX processing techniques introduced in this book will provide very helpful information to game programmers. Due to the lack of instructional books about VFX-related game programming, the demand for knowledge regarding these high-tech VFXs might be very high.


Archive | 2015

Water and Bubbles

Chang Hun Kim; Sun-Jeong Kim; Soo-Kyun Kim; Shin-Jin Kang

This section introduces a new fluid animation technique in which liquid and gas interact with each other, using the example of bubbles rising in water. In contrast to previous studies which only focused on one fluid, this system considers both the liquid and gas simultaneously. In addition to the flowing motion, the interactions between liquid and gas cause buoyancy, surface tension, deformation, and movement of the bubbles. For the natural manipulation of topological changes and the removal of the numerical diffusion, we combine the volume of fluid method and the front-tracking method developed in the field of computational fluid dynamics. Our minimum stress surface tension method enables this complementary combination. The interfaces are constructed using the marching cubes algorithm. Optical effects are rendered using vertex shader techniques.


Archive | 2015

Real-Time Visual Effects Programming

Chang Hun Kim; Sun-Jeong Kim; Soo-Kyun Kim; Shin-Jin Kang

This chapter shows the essential part to implement real-time visual effects. An application such as a game should run in real time to interact with users. For smooth interaction, its rendering speed should be more than 30 FPS (33 ms per frame). Due to recent technological advances computation power becomes very high, but it is almost impossible to obtain real-time visual effects using CPU-based computation yet. To overcome this shortcoming, CUDA SDK from NVIDIA utilizes idle resources of the graphic card for computation and it leads to maximizing operational efficiency and enhancing computation power. This chapter presents an example of visual effects programming with CUDA SDK. The programming codes in this chapter help to implement and directly control a simple 3D fluid simulation. For stability of the simulation, the most up-to-date method, “Position-based Fluid” and the screen space rendering method are implemented. Both methods optimize the usage of GPUs and shaders.


Archive | 2015

Basic Concepts of Visual Effects

Chang Hun Kim; Sun-Jeong Kim; Soo-Kyun Kim; Shin-Jin Kang

This chapter introduces the fundamental theory for understanding the entire contents of this book. A method to solve fluid equation for fire, water, and smoke simulations is explained. And also, background knowledge and research trends for modeling the natural environment such as ice formation are described. In addition to fluid dynamics, a coupling problem for solid–fluid collision detection and various methods of controlling fluid animation are dealt with. This chapter is organized as follows: underlying concepts for simulations of water, smoke, fire and ice are presented in Sects. 1.1–1.3. Collision response of fluid and target-driven fluid animation are discussed in Sect. 1.4.


Multimedia Tools and Applications | 2015

Software robot authoring tools for sharing intelligence among users and content providers

A-Ra Khil; Kang-Hee Lee; Soo-Kyun Kim

This paper proposes the authoring tools of the software robot (Sobot) for sharing intelligence among users and content providers. The proposed authoring tool package, Sobot studio is accessible to both developers and end-users of Sobot content. The Sobot studio allows them to easily create interactive software robot message with programming features. It encourages openness to everyone, user participation, and common ownership of emotional Sobot content based on web 2.0 paradigm. The authored Sobots can connect with and move to any device such as PCs, mobile phones, PDAs, or web portal sites at anytime. The experimental results verify that the emotional pet-type Sobots can easily transfer among heterogeneous devices through the network based on the ubiquitous paradigm.


International Journal of Distributed Sensor Networks | 2015

Automated verification methodology of security events based on heuristic analysis

Jungsuk Song; Younsu Lee; Kyu-Il Kim; Seok-Hun Kim; Soo-Kyun Kim; Sang-Soo Choi

We present an automated verification methodology of the security events, that is, IDS alerts, based on heuristic analysis. The proposed verification methodology aims to automatically identify real cyberattacks from the security events and filter out false positive, so that the security analyst is able to conduct security monitoring and response more effectively. For the proposed verification methodology, we used the 1,528,730,667 security events that were obtained from Science and Technology Security Center (S&T-SEC). We then extracted the core security events that were caused by the real cyberattacks. Among the core security events, we selected the top 20 types of the security events in the number of the real attacks that they raised. By analyzing the top 20 types of the security events, we discovered essential elements and optional elements for using in the automated verification of the security events. The evaluation results showed that the proposed verification methodology could contribute to the reduction (about 67%) of the meaningless security events. Furthermore, we demonstrated that the proposed verification methodology contributed to the detection of 140 true negatives that were not identified by the security analyst and the total accuracy of the proposed verification methodology was 96.1%.


Security and Communication Networks | 2012

A VoIP system for mobility voice security support using the VPN

Seok-Hun Kim; Soo-Kyun Kim; Jong Hyuk Park

Voice over internet protocol (VoIP) provided voice service using Internet. It receives footlights when it escapes an initial curiosity. Interest to VoIP increased, because it can transfer existing phone service and deliver voice data through Internet technology. Communication service providers introduce Next Generation Network and Broadband convergence Network with VoIP as an added service to the consumer. In addition, session initiation protocol (SIP) service can be applied even outside the Internet phone service. However, it is needed to ensure secrecy of VoIP call in a special situation. It is relatively difficult to eavesdrop in the commonly used Public Switched Telephone Network (PSTN) as it is connected with 1:1 circuit. In this paper, we propose a new model of Internet telephone for eavesdrop prevention enabling VoIP (using SIP protocol) to use the virtual private network (VPN) protocol and establish the probability of practical use comparing it with Internet telephone. Copyright

Collaboration


Dive into the Soo-Kyun Kim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sang-Soo Choi

Korea Institute of Science and Technology Information

View shared research outputs
Top Co-Authors

Avatar

Jong Hyuk Park

Seoul National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jungsuk Song

National Institute of Information and Communications Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jinsul Kim

Chonnam National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge