Moosung Park

ORCID: 0000-0003-0760-5072
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Network Security and Intrusion Detection
  • Cybersecurity and Cyber Warfare Studies
  • Spam and Phishing Detection
  • Anomaly Detection Techniques and Applications
  • Privacy, Security, and Data Protection
  • Technology and Data Analysis
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Mobile Ad Hoc Networks
  • Complex Network Analysis Techniques
  • IoT and Edge/Fog Computing
  • Military Strategy and Technology
  • Advanced Optical Network Technologies
  • Robotics and Automated Systems
  • Blockchain Technology Applications and Security
  • Nerve injury and regeneration
  • Software System Performance and Reliability
  • Mobile Agent-Based Network Management
  • Parkinson's Disease Mechanisms and Treatments
  • Neurological disorders and treatments
  • Misinformation and Its Impacts
  • Privacy-Preserving Technologies in Data
  • IPv6, Mobility, Handover, Networks, Security
  • Sentiment Analysis and Opinion Mining

Agency for Defense Development
2017-2023

Sejong University
2022-2023

Korea University of Science and Technology
2017

Korea Institute of Brain Science
2017

Korea Institute of Science and Technology
2017

Convergence
2014

To develop novel, selective, and reversible MAO-B inhibitors for safer treatment of Parkinson's disease, benzothiazole benzoxazole derivatives with indole moiety were designed synthesized. Most the synthesized compounds showed inhibitory activities against selectivity over MAO-A. The most active compound was 5b, 6-fluoro-2-(1-methyl-1H-indol-5-yl)benzo[d]thiazole an IC50 value 28 nM no apparent effect on MAO-A activity at 10 μM. Based reversibility assay, 5b turned out to be fully 95%...

10.1021/acschemneuro.7b00050 article EN ACS Chemical Neuroscience 2017-03-25

Securing Internet of Things is a challenge because its multiple points vulnerability. In particular, Distributed Denial Service (DDoS) attacks on IoT devices pose major security to be addressed. this paper, we propose DNS query-based DDoS attack mitigation system using Software-Defined Networking (SDN) block the network traffic for attacks. With some features provided by SDN, can analyze patterns and filter suspicious flows out. To show feasibility proposed system, particularly implemented...

10.1109/milcom.2017.8170802 article EN MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) 2017-10-01

Over a decade, intelligent and persistent forms of cyber threats have been damaging to the organizations' assets missions. In this paper, we analyze current kill chain models that explain adversarial behavior perform advanced threat (APT) attacks, propose model can be used in view situation awareness. Based on proposed model, taxonomy classifies attack tactics techniques for each phase using CAPEC, ATT&CK classify tactics, techniques, procedures (TTPs) by MITRE. We also implement common...

10.1109/cybersa.2018.8551383 article EN 2018-06-01

The EU GDPR comes into effect on May 25, 2018. Under this regulation, stronger legislation than the existing directive can be enforced. IoT industry, especially among various industries, is expected to heavily influenced by since it uses diverse and vast amounts of personal information. This paper first analyzes how industry handles information summarizes why affected GDPR. then cost definition Gordon Loeb model estimate affects firms qualitatively statistical legal bases quantitatively....

10.1155/2018/6792028 article EN cc-by Mobile Information Systems 2018-12-05

The EU's GDPR is expected to come into force on May 25, 2018. By this regulation, it will be possible enforce even stronger legislation than the existing Directive. In particular, have a major impact IoT industry, which uses diverse and vast amounts of personal information. This paper first examines why industry affected by GDPR. Then, describes how affect firm's cost qualitatively using definition Gordon Loeb model quantitatively estimating statistics legal bases. As qualitative view,...

10.1109/ictc.2017.8190804 article EN 2021 International Conference on Information and Communication Technology Convergence (ICTC) 2017-10-01

It is essential to build a practical environment of the training/test site for cyber training and weapon system test evaluation. In military environment, sites should be continuously developed according characteristics military. Weapons with security capabilities deployed through certification. Recently, each has been building its own range that simulates battlefield environment. However, since actual an integrated operation built does not reflect interconnected. This paper proposes...

10.3390/app122412546 article EN cc-by Applied Sciences 2022-12-07

North Korean cyber-attack groups such as Kimsuky, Lazarus, Andariel, and Venus 121 continue to attempt spear-phishing APT attacks that exploit social issues, including COVID-19. Thus, along with the worldwide pandemic of COVID-19, related threats also persist in cyberspace. In January 2022, a hacking attack, presumed be group, intending steal research data The problem is activities are continuously increasing, it difficult accurately identify attack origins only limited analysis information....

10.3390/electronics11244142 article EN Electronics 2022-12-12

It is difficult to assess the business impact of a cyberattack and implement appropriate strategies or policies enhance cyber resilience counter future attacks. Penetration testing, which currently gaining popularity, has been employed defense levels in actual operating environments. However, it expensive time-consuming only reveals current state problem without providing insights into potentially better alternative strategies. To overcome these limitations, cybersecurity modeling simulation...

10.1109/access.2023.3324901 article EN cc-by-nc-nd IEEE Access 2023-01-01

ROS(Robot Operating System)는 로봇 소프트웨어 개발에 사용되는 일종의 프레임워크로서 무인화 시대를 맞이하여 다수의 로봇에서 현재 사용되고 있다. 2010년 ROS1.0이 발표 된 후 보안과 실시간성을 개선하기 위해서 DDS(Data Distribution Service) 미들웨어 기반의 ROS2가 발표되었다. ROS2는 DDS 기반으로 Publish-Subscribe(발행-구독) 메커니즘을 통해 통신하고 평문/암호통신도 가능하며 벤더간 통신도 가능하다. 이에 기존의 ROS2 성능 분석 논문이 발표되고 있고 주로 통신 테스트, 평문/암호통신에 따른 지연시간/처리량, QoS 옵션별 오버헤드 등이 대부분이다. 본 논문에서는 ROS2의 암호통신이 그룹키 통신이 아니라 Pairwise 키 수행된다는 점을 고려하여 Subscriber 수에 통신시간을 실험하였다. 실험 결과 통신방법(평문/암호) 뿐 따라 통신시간이 폭발적으로 증대됨을 확인하였다.

10.14801/jkiit.2024.22.2.93 article KO The Journal of Korean Institute of Information Technology 2024-02-28

Cybersecurity is one of critical issues in modern military operations. In cyber operations, security professionals depend on various information and systems to mitigate threats through enhanced situational awareness. Cyber awareness can give decision makers mission completeness providing appropriate timely support for proactive response. The crucial be collected at network boundaries deep packet inspection with systems. Regular expression regarded as a practical method that considering next...

10.1109/milcom.2017.8170859 article EN MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM) 2017-10-01

본 논문에서는 링크상태 라우팅 프로토콜을 위한효율적인 LSA(Link State Advertisements) 플러딩(flooding) 방식을 제안한다. 링크상태(Link State) 프로토콜은 유선 환경에서 널리 사용되고 있는 프로토콜로서, 노드의 링크 상태가 변경이 된 경우에 네트워크의 모든 이웃 노드에게 LSA를 플러딩 한다. 환경과 다르게 무선 환경에서는 링크의 상태 변화가 빈번하게 발생되기 때문에 LSA의 오버헤드가 문제로 발생하게 된다. 사용 가능한 효율적인 LSA In this paper we propose an efficient algorithm for flooding. Link state routing protocols have been widely adopted in wired networks. When link change occurs, a is flooded into the whole network. The overhead of flooding may be...

10.7840/kics.2014.39b.5.326 article EN The Journal of Korean Institute of Communications and Information Sciences 2014-05-31

With the advancement of IT technology, intelligent devices such as autonomous vehicles, unmanned equipment, and drones are rapidly evolving. Consequently, proliferation defense systems based on these technologies is increasing worldwide. In response, U.S. Department Defense implementing RMF (Risk Management Framework) to ensure cybersecurity conducting T&E (test evaluation) concurrently. However, conducted during acquisition phase often result in fragmented assessments, excluding...

10.3390/info15010018 article EN cc-by Information 2023-12-28

MANET의 기반 연구 기술들의 결과를 토대로 현실 속에서 MANET을 활용하기 위한 응용으로써 다양한 서비스 발견 및 전달 기법들이 제안되고 있다. 본 논문에서는 MANET에서의 메시지 오버헤드의 최소화와 안정적인 네트워크의 확장성을 보장하기 T-Chord(Trustworthy-based Chord) 링 시스템을 제안한다. T-Chord 시스템은 모바일 환경에서 이동 노드들이 제공하는 서비스들을 효율적으로 관리하기 위해 P2P 오버레이 네트워크 기법을 이용한 시스템으로, MANET에서 노드들은 이동성을 갖으며 요청 노드, 제공 노드 그리고 노드로써 동작하기 노드들의 Trustworthy 평가와 분산된 정보의 수집, 구성을 통한 O(Log N) 성능을 Chord 알고리즘 모듈로 내부 구성하였다. 시스템의 성능 평가는 NS2 시뮬레이터를 이용하여BR기존의 기법들과 오버헤드, 전달의 효율성, 확장성 측면에서 비교 평가하고 분석함으로써 효과적인 우수함을 입증하였다.

10.5573/ieek.2013.50.1.051 article KO Journal of the Institute of Electronics and Information Engineers 2013-01-25

Recent cyber attacks are affecting the cyberspace as well real world, causing social confusion. Russia Scandal in US presidential election 2016 is a representative example. This case being discussed up to impeachment of president. Cyber influence that affect space. An effectiveness such boosts when insiders execute. study analyzed keywords related during 2016. Based on this, paper used sentiment analysis for analyzing psychology current Russian suspect.

10.1145/3139923.3139936 article EN 2017-10-30

오늘날 복잡한 네트워크 망을 가지게 됨에 따라 기기들의 자산식별은 관리 및 보안관점에서 중요한 사항으로 대두되고 있다. 이러한 자산들은 망에 연결되어 있기 때문에 네트워크망 구조를 알아내고, 각 자산의 위치 연결 상태를 확인하는 것 또한 중요하다. 이는 구조상의 취약점들을 밝혀내는데 사용되어지고, 이를 통하여 취약점을 보완할 수 하지만 적은 리소스를 가지는 사물인터넷의 망에서는 알아내기 위하여 모니터들이 보내는 Traceroute 패킷이 사물인터넷 기기들에게 과부하를 줄 본 논문에서는 기존에 사용 되던 더블 트리 알고리즘을 효과적으로 발전시킴으로써 사물인터넷이 이루는 망의 부하를 줄인다. 부하 균형을 이루기 이 새로운 목적지 매칭 제시하고, 통계학적으로 현재 탐색하고 있는 경로와 가장 겹치지 않은 경로로 탐색을 시도한다. 통해서 네트워크의 이루고, 부가적으로 모니터의 리소스 사용을 균등하게 한다.

10.5626/jok.2017.44.10.1071 article KO Journal of KIISE 2017-10-31

With the recent increase in IoT devices, network connectivity devices such as routers or switches are increasing. This equipment could degree of a particular node (hub hub router) terms characteristics. In other words, structure can be changed into more complicated form. The convergence links to these specific nodes provides an opportunity for attackers enjoy maximum benefit at minimal cost. An attacker attack only few with high structure, which paralyze networks some areas. possibility is...

10.1109/bigcomp.2018.00111 article EN 2018-01-01
Coming Soon ...