- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Anomaly Detection Techniques and Applications
- Internet Traffic Analysis and Secure E-voting
- Spam and Phishing Detection
- Software Testing and Debugging Techniques
- Information and Cyber Security
- Security and Verification in Computing
- Digital and Cyber Forensics
- Machine Learning and Algorithms
- Neural Networks and Applications
- Domain Adaptation and Few-Shot Learning
- Peer-to-Peer Network Technologies
- User Authentication and Security Systems
- Face and Expression Recognition
- Privacy, Security, and Data Protection
- Fire Detection and Safety Systems
- Chaos-based Image/Signal Encryption
- Data Stream Mining Techniques
- Web Data Mining and Analysis
- Digital Media Forensic Detection
- Software System Performance and Reliability
- Web Application Security Vulnerabilities
- Advanced Authentication Protocols Security
- IPv6, Mobility, Handover, Networks, Security
National Institute of Information and Communications Technology
2016-2025
Kansai Electric Power Hospital
2023
Semyung University
2013
National Institute on Consumer Education
2013
National Yunlin University of Science and Technology
2013
Sun Yat-sen University
2013
Osaka University
2005
With the rapid evolution and proliferation of botnets, large-scale cyber attacks such as DDoS, spam emails are also becoming more dangerous serious threats. Because this, network based security technologies Network Intrusion Detection Systems (NIDSs), Prevention (IPSs), firewalls have received remarkable attention to defend our crucial computer systems, networks sensitive information from attackers on Internet. In particular, there has been much effort towards high-performance NIDSs data...
Contemporary security information and event management (SIEM) solutions struggle to identify critical incidents effectively due the overwhelming number of false alerts generated by disparate products, which results in significant alert fatigue hinders effective incident response. To overcome this challenge, we propose a next-generation SIEM framework that integrates orchestration automation response capabilities utilizes divide-and-conquer strategy mitigate impact low-quality IDS alerts. The...
With the rise of IoT botnets, remediation infected devices has become a critical task.As over 87% these reside in broadband networks, this task will fall primarily to consumers and Internet Service Providers.We present first empirical study malware cleanup wild -more specifically, removing Mirai infections network medium-sized ISP.To measure rates, we combine data from an observational randomized controlled trial involving 220 who suffered infection together with honeypots darknets.We find...
Security Incident and Event Manager (SIEM) is a security management approach designed to identify possible threats within real-time enterprise environment. The main challenge for SIEM find critical incidents among huge number of less alerts coming from separate products. continuously growing internet-connected devices has led the alert fatigue problem, which defined as inability operators investigate each incoming intrusion detection systems. This can lead human errors leave many being not...
The main challenge for security information and event management (SIEM) is to find critical incidents among a huge number of false alerts generated from separate products. To address the alert fatigue problem that common experts operating SIEM, we propose new screening scheme leverages artificial intelligence (AI)-assisted tools distinguish actual threats alarms without investigating every alert. proposed incorporates carefully chosen learning algorithms newly designed visualization...
Intrusion analysis is essential for cybersecurity, but oftentimes, the overwhelming number of false alerts issued by security appliances can prove to be a considerable hurdle. Machine learning algorithms automate task known as alert data facilitate faster triage and incident response. This paper presents bidirectional approach address severe class imbalance in analysis. The proposed method utilizes an ensemble three oversampling techniques generate augmented set high-quality synthetic...
Simple implementation and autonomous operation features make the Internet-of-Things (IoT) vulnerable to malware attacks. Static analysis of IoT executable files is a feasible approach understanding behavior for mitigation prevention. However, current analytic approaches based on opcodes or call graphs typically do not work well with diversity in central processing unit (CPU) architectures are often resource intensive. In this paper, we propose an efficient method leveraging machine learning...
In this era of rapid network development, Internet Things (IoT) security considerations receive a lot attention from both the research and commercial sectors. With limited computation resource, unfriendly interface, poor software implementation, legacy IoT devices are vulnerable to many infamous mal ware attacks. Moreover, heterogeneity platforms diversity malware make detection classification even more challenging. paper, we propose use printable strings as an easy-to-get but effective...
Considering rapid increase of recent highly organized and sophisticated malwares, practical solutions for the countermeasures against malwares especially related to zero-day attacks should be effectively developed in an urgent manner. Several research activities have been already carried out focusing on statistic calculation network events by means global sensors (so-called macroscopic approach) as well direct malware analysis such code microscopic approach). However, current activities, it...
In light of the rapid growth malware threats towards Android platform, there is a pressing need to develop effective solutions. this paper we explorate potential multi-modal features enhance detection accuracy while keep false alarms low. Examined include permissions, Application Programming Interface (API) calls, and meta such as category information Package (APK) descriptions. These are coded in way facilitate efficient learning testing with particular classifiers known linear support...
As cyberattacks become increasingly prevalent globally, there is a need to identify trends in these and take suitable countermeasures quickly. The darknet, an unused IP address space, relatively conducive observing analyzing indiscriminate because of the absence legitimate communication. Indiscriminate scanning activities by malware spread their infections often show similar spatiotemporal patterns, such are also observed on darknet. To problem early detection activities, we focus anomalous...
Malware, such as computer viruses, worms, and bots, has been recognized one of the major security threats in Internet environment, a large amount research development is taking place to find effective countermeasures. These countermeasures are mainly based on either macroscopic or microscopic analysis. Macroscopic analysis monitoring network order grasp global trends malware propagations while investigates executables identify details how they behave. We have developing incident center for...
Malware has been recognized as one of the major security threats in Internet. Previous researches have mainly focused on malware's internal activity a system. However, it is crucial that malware analysis extracts external toward network to correlate with incident. We propose novel way analyze malware: focus closely (i.e., network) activity. A sample executed sandbox consists real machine victim and virtual Internet environment. Since this environment totally isolated from Internet, execution...
Global darknet monitoring provides an effective way to observe cyber-attacks that are significantly threatening network security and management. In this paper, we present a study on characterization of cyberattacks in the big stream data collected large scale distributed using association rule learning. The experiment shows learning can support strategic cyberattack countermeasure following ways. First, statistics computed from malware-specific rules lead better understanding global trend...
Max-flow has been adopted for semi-supervised data modelling, yet existing algorithms were derived only the learning from static data. This paper proposes an online max-flow algorithm streams. Consider a graph learned labelled and unlabelled data, being updated dynamically accommodating adding retiring. In resulting non stationary graph, we augment de-augment paths to update with theoretical guarantee that equals batch retraining. For classification, compute min-cut over current max-flow, so...
We have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter), whose objective is to detect and identify propagating malwares. The nicter mainly monitors darknet, a set of unused IP addresses, observe global trends network threats, while it captures analyzes malware executables. By correlating threats with results malware, identifies root causes (malwares) detected threats. Through long-term operation more than five years, we achieved some key findings...
A darknet is a set of unused IP addresses whose monitoring an effective way detecting malicious activities on the Internet. We have developed alert system called DAEDALUS (direct environment for and livenet unified security), which based large-scale monitoring. This paper presents novel real-time 3D visualization engine DAEDALUS-VIZ that enables operators to grasp visually in real time complete overview circumstances provides highly flexible tangible interactivity. describe some case studies...