This page has only limited features, please log in for full access.

Unclaimed
Jaekyung Han
Department of Construction Legal Affairs, The Graduate School of Construction Legal Affairs, Kwangwoon University, Seoul 01890, Korea

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 11 March 2019 in Symmetry
Reads 0
Downloads 0

The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). However, both the development and proliferation of IoT technology have caused various problems such as personal information leakage and privacy violations due to attacks by hackers. Furthermore, countless devices are connected to the network in the sense that all things are connected to the Internet, and network attacks that have thus far been exploited in the existing PC environment are now also occurring frequently in the IoT environment. In fact, there have been many security incidents such as DDoS attacks involving the hacking of IP cameras, which are typical IoT devices, leakages of personal information and the monitoring of numerous persons without their consent. While attacks in the existing Internet environment were PC-based, we have confirmed that various smart devices used in the IoT environment—such as IP cameras and tablets—can be utilized and exploited for attacks on the network. Even though it is necessary to apply security solutions to IoT devices in order to prevent potential problems in the IoT environment, it is difficult to install and execute security solutions due to the inherent features of small devices with limited memory space and computational power in this aforementioned IoT environment, and it is also difficult to protect certificates and encryption keys due to easy physical access. Accordingly, this paper examines potential security threats in the IoT environment and proposes a security design and the development of an intelligent security framework designed to prevent them. The results of the performance evaluation of this study confirm that the proposed protocol is able to cope with various security threats in the network. Furthermore, from the perspective of energy efficiency, it was also possible to confirm that the proposed protocol is superior to other cryptographic protocols. Thus, it is expected to be effective if applied to the IoT environment.

ACS Style

Jaeseung Lee; Jungho Kang; Moon-Seog Jun; Jaekyung Han. Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment. Symmetry 2019, 11, 361 .

AMA Style

Jaeseung Lee, Jungho Kang, Moon-Seog Jun, Jaekyung Han. Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment. Symmetry. 2019; 11 (3):361.

Chicago/Turabian Style

Jaeseung Lee; Jungho Kang; Moon-Seog Jun; Jaekyung Han. 2019. "Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment." Symmetry 11, no. 3: 361.

Journal article
Published: 13 February 2017 in Sustainability
Reads 0
Downloads 0

The darknet (i.e., a set of unused IP addresses) is a very useful solution for observing the global trends of cyber threats and analyzing attack activities on the Internet. Since the darknet is not connected with real systems, in most cases, the incoming packets on the darknet (‘the darknet traffic’) do not contain a payload. This means that we are unable to get real malware from the darknet traffic. This situation makes it difficult for security experts (e.g., academic researchers, engineers, operators, etc.) to identify whether the source hosts of the darknet traffic are infected by real malware or not. In this paper, we present the overall procedure of the in-depth analysis between the darknet traffic and IDS alerts using real data collected at the Science and Technology Cyber Security Center (S&T CSC) in Korea and provide the detailed in-depth analysis results. The ultimate goal of this paper is to provide practical experience, insight and know-how to security experts so that they are able to identify and trace the root cause of the darknet traffic. The experimental results show that correlation analysis between the darknet traffic and IDS alerts is very useful to discover potential attack hosts, especially internal hosts, and to find out what kinds of malware infected them.

ACS Style

Jungsuk Song; Younsu Lee; Jang-Won Choi; Joon-Min Gil; Jaekyung Han; Sang-Soo Choi. Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet. Sustainability 2017, 9, 262 .

AMA Style

Jungsuk Song, Younsu Lee, Jang-Won Choi, Joon-Min Gil, Jaekyung Han, Sang-Soo Choi. Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet. Sustainability. 2017; 9 (2):262.

Chicago/Turabian Style

Jungsuk Song; Younsu Lee; Jang-Won Choi; Joon-Min Gil; Jaekyung Han; Sang-Soo Choi. 2017. "Practical In-Depth Analysis of IDS Alerts for Tracing and Identifying Potential Attackers on Darknet." Sustainability 9, no. 2: 262.

Journal article
Published: 09 January 2017 in Symmetry
Reads 0
Downloads 0

Infrastructure as a service with desktops (DIaaS) based on the extensible mark-up language (XML) is herein proposed to utilize surplus resources. DIaaS is a traditional surplus-resource integrated management technology. It is designed to provide fast work distribution and computing services based on user service requests as well as storage services through desktop-based distributed computing and storage resource integration. DIaaS includes a nondisruptive resource service and an auto-scalable scheme to enhance the availability and scalability of intra-cloud computing resources. A performance evaluation of the proposed scheme measured the clustering performance time for surplus resource utilization. The results showed improvement in computing and storage services in a connection of at least two computers compared to the traditional method for high-availability measurement of nondisruptive services. Furthermore, an artificial server error environment was used to create a clustering delay for computing and storage services and for nondisruptive services. It was compared to the Hadoop distributed file system (HDFS).

ACS Style

Hyun-Woo Kim; Jaekyung Han; Jong Hyuk Park; Young-Sik Jeong. DIaaS: Resource Management System for the Intra-Cloud with On-Premise Desktops. Symmetry 2017, 9, 8 .

AMA Style

Hyun-Woo Kim, Jaekyung Han, Jong Hyuk Park, Young-Sik Jeong. DIaaS: Resource Management System for the Intra-Cloud with On-Premise Desktops. Symmetry. 2017; 9 (1):8.

Chicago/Turabian Style

Hyun-Woo Kim; Jaekyung Han; Jong Hyuk Park; Young-Sik Jeong. 2017. "DIaaS: Resource Management System for the Intra-Cloud with On-Premise Desktops." Symmetry 9, no. 1: 8.

Journal article
Published: 27 August 2015 in Symmetry
Reads 0
Downloads 0

Unlike CCTV, security video surveillance devices, which we have generally known about, IP cameras which are connected to a network either with or without wire, provide monitoring services through a built-in web-server. Due to the fact that IP cameras can use a network such as the Internet, multiple IP cameras can be installed at a long distance and each IP camera can utilize the function of a web server individually. Even though IP cameras have this kind of advantage, it has difficulties in access control management and weakness in user certification, too. Particularly, because the market of IP cameras did not begin to be realized a long while ago, systems which are systematized from the perspective of security have not been built up yet. Additionally, it contains severe weaknesses in terms of access authority to the IP camera web server, certification of users, and certification of IP cameras which are newly installed within a network, etc. This research grouped IP cameras hierarchically to manage them systematically, and provided access control and data confidentiality between groups by utilizing group keys. In addition, IP cameras and users are certified by using PKI-based certification, and weak points of security such as confidentiality and integrity, etc., are improved by encrypting passwords. Thus, this research presents specific protocols of the entire process and proved through experiments that this method can be actually applied.

ACS Style

Jungho Kang; Jaekyung Han; Jong Hyuk Park. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key. Symmetry 2015, 7, 1567 -1586.

AMA Style

Jungho Kang, Jaekyung Han, Jong Hyuk Park. Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key. Symmetry. 2015; 7 (3):1567-1586.

Chicago/Turabian Style

Jungho Kang; Jaekyung Han; Jong Hyuk Park. 2015. "Design of IP Camera Access Control Protocol by Utilizing Hierarchical Group Key." Symmetry 7, no. 3: 1567-1586.