Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sunoh Choi is active.

Publication


Featured researches published by Sunoh Choi.


international conference on advanced communication technology | 2017

Network abnormal behaviour analysis system

Sunoh Choi; Yangseo Choi; Jooyoung Lee; Jong Hyun Kim; Ikkyun Kim

As cyber attacks have increased in recent years, network forensics, which collects and analyses network packets as well as digital forensics, has been studied. However, high-speed networks such as 1 or 10 Gbps networks have many network flows. For example, a 1 Gbps network has hundreds of millions of network flows per day. Analysing network traffic in this situation is very difficult and time-consuming. In this paper, we propose a system that can analyse network abnormal behaviour quickly and easily. We first propose a system that stores the TCP flag when generating network flows. Second, we present some ways to use the TCP flag in network flows to analyse network anomalies such as persistent outbound connections.


Archive | 2015

Performance Comparison of Relational Databases and Columnar Databases Using Bitmap Index for Fast Search of 10Gbps Network Flows

Sunoh Choi; Hyun-Wook Park; Jooyoung Lee; Jong Hyun Kim; Ikkyun Kim

Recently a lot of Cyber Attacks are done. In order to prevent these Cyber Attacks, first we should be able to analyze attacks from network traffic like packets and flows. However, in high speed network like 10Gbps, there are millions of packets and tens of thousands of flows per second. So, it is very difficult just to find a flow which a security investigator wants to see within a short time. To make search fast, we have to use indexes used in databases. In this paper, we show loading time and search time in relational database and columnar database using bitmap index.


international conference on information and communication technology convergence | 2016

Hierarchical network signature clustering and generation

Sunoh Choi; Jooyoung Lee; Yangseo Choi; Jong Hyun Kim; Ikkyun Kim

Nowadays we face a lot of malware. When we access web sites, they are secretly downloaded by drive-by-download and when we receive emails, the attached files contain malware. The malware cause a lot of damage to the infected hosts and networks. So, detecting malware is very important. However, recent malware are made not to be detected by an Intrusion Detection System (IDS). In order to prevent this problem, it is very crucial to generate new signatures fast when new malware are discovered. This paper proposes a method to make a hierarchical signature cluster tree from the existing network signatures and suggests a scheme to make new signatures fast by comparing with the hierarchical signature cluster tree when new malware are discovered.


international conference on information and communication technology convergence | 2016

Traffic storing and related information generation system for cyber attack analysis

Yangseo Choi; Jooyoung Lee; Sunoh Choi; Jong Hyun Kim; Ikkyun Kim

As the sophisticated attacks are increased continuously, the attack analysis technologies are getting more important. It is needed to collect attack related information or data first for the attack analysis. But attackers make an effort to get rid of all the attack related information that they can find and adopt anti-forensic technologies as well, so it is quite difficult to collect sufficient information for attack analysis. For further analysis network traffic could be a good candidate. It could not be removed by the attackers and has a lot of information about what the attackers were doing. However, network traffic is volatile information and only exist while they are being transmitted. Therefore, in order to collect network packets they have to be stored while they are being transmitted in real time. Besides, network traffic is huge amount of volatile data so it should be captured and stored on a mass storage device. For that we propose a Traffic storing and Related Information Generation system for cyberattack analysis, TRIG, which can store 20Gbps network traffic in real time and generate various traffic related information at the same time for further analysis.


world congress on internet security | 2015

Transmitted file extraction and reconstruction from network packets

Yangseo Choi; Jooyoung Lee; Sunoh Choi; Jong Hyun Kim; Ikkyun Kim

When hackers try to attack a target system, their first goal is to install a malware to the target system. It is because hackers can do anything what they want if a malware is installed. In the past, most of the malwares were Microsoft PE files, however they have been changed to various file formats such as pdf, jpg, doc, jar and so on. Under this circumstances some network security systems such as network forensics systems have to reconstruct those malwares from network packets to analyze the malwares. For that, we propose a file type signature and network protocol analysis based transmitted file reconstruction technique which can reconstruct various file types from network packets. In this paper, we show the implementation and file reconstruction results.


international conference on advanced communication technology | 2016

Introduction to a network forensics system for cyber incidents analysis

Yangseo Choi; Jooyoung Lee; Sunoh Choi; Jong Hyun Kim; Ikkyun Kim


international conference on information and communication technology convergence | 2017

Malware detection using malware image and deep learning

Sunoh Choi; Sungwook Jang; Youngsoo Kim; Jong Hyun Kim


international conference on information and communication technology convergence | 2016

A forensically robust data acquisition from a 10G line-rate network

Jooyoung Lee; Sunoh Choi; Yangseo Choi; Jong Hyun Kim; Ikkyun Kim


The Journal of Korean Institute of Communications and Information Sciences | 2016

Tracking the Source of Cascading Cyber Attack Traffic Using Network Traffic Analysis

Young-Hoon Goo; Sunoh Choi; Su-Kang Lee; Sung-Min Kim; Myung-Sup Kim


Security Technology 2016 | 2016

Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence

Jong Hyun Kim; Yangseo Choi; Jooyoung Lee; Sunoh Choi; Ikkyun Kim

Collaboration


Dive into the Sunoh Choi's collaboration.

Top Co-Authors

Avatar

Jong Hyun Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Ikkyun Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jooyoung Lee

Korea Institute for Advanced Study

View shared research outputs
Top Co-Authors

Avatar

Yangseo Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Myung-Sup Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hyun-Wook Park

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge