Welcome to the official homepage of Professor Jong Hyun Kim, a leading researcher in 5G/6G mobile communication security, cloud security, and cybersecurity at Sejong University's Department of Computer and Information Security. Leading the future of mobile and network security through innovative research, education, and real-world solutions at NGNS Lab.
Our Research focuses on cutting-edge security technologies for next-generation network security solutions.
1
5G/6G Mobile Comm. Security
Secure architectures for 5G/6G, Open RAN, and NTN with ITU-T, ITU-R standardization
2
System Security using AI
AI-based malware, Anomaly detection, Anti-Vaccine system development
3
Cloud/Network Security
Security for NW threat analysis and countermeasure development
4
UAV/Drones Security
Security for UAVs, V2X, and D2D, Detection of UxNB anomalies
Ongoing Projects
Development of Security Threat Response and Privacy Protection Technologies and International Cooperation for Establishing a Trusted Global Ecosystem in 6G NTN, IITP (Institute of Information & Communications Technology Planning & Evaluation), 2025.07.01. ~ 2027.12.31.
Research and international collaboration on trust model-based intelligent incident response technologies in 6G open network environment, IITP (Institute of Information & Communications Technology Planning & Evaluation), 2024.07.01. ~ 2026.12.31.
Completed Projects
Research on Foundational Technologies for 6G Autonomous Security-by-Design to Guarantee Constant Quality of Security, IITP (Institute of Information & Communications Technology Planning & Evaluation), 2021.04.01. ~ 2024.12.31.
Collaborative research on element Technologies for 6G Security-by-Design and standardization-based international cooperation, IITP (Institute of Information & Communications Technology Planning & Evaluation), 2021.07.01. ~ 2024.12.31.
Development of 5G Edge Security Technology for Ensuring 5G+ Service Stability and Availability, IITP (Institute of Information & Communications Technology Planning & Evaluation), 2020.04.01. ~ 2021.12.31.
ICT infrastructure protection against intelligent malware threats, IITP (Institute of Information & Communications Technology Planning & Evaluation), 2019.04.01. ~ 2022.12.31.
Cloud based Security Intelligence Technology Development for the Customized Security Service Provisioning, IITP (Institute of Information & Communications Technology Planning & Evaluation), 2016.04.01. ~ 2019.12.31.
Developing threat analysis and response technology based on Security Analytics for Heterogeneous security solution, IITP (Institute of Information & Communications Technology Planning & Evaluation), 2017.04.01. ~ 2018.12.31.
The Development of Cyber Blackbox and Integrated Security Analysis Technology for Proactive and Reactive Cyber Incident Response, IITP (Institute of Information & Communications Technology Planning & Evaluation), 2014.04.01. ~ 2017.02.28.
Cyber targeted attack recognition and trace-back technology based-on long-term historic analysis of multi-source data, IITP (Institute of Information & Communications Technology Planning & Evaluation), 2013.03.01. ~ 2017.02.28.
Development of global collaborative integrated security control system, KCA (Korea Communications Agency), 2010.03.01. ~ 2013.02.28.
Development of Intelligent Cyber Attack Monitoring and Tracking System in All-IP Environment, 2007.03.01. ~ 2010.02.28.
Development of Anomaly Sign Collection and Analysis System, 2005.07.01. ~ 2007.02.28.
Publications
International Journal
Siriwardhana, Y., Samarakoon, S., Porambage, P., Liyanage, M., Chang, S., Kim, J., Kim, J. & Ylianttila, M., Descriptor: 5G Wireless Network Intrusion Detection Dataset (5G-NIDD), IEEE Data Descriptions, pp.1-12, July 2025
Martin, G., Lee, S., Kim, J., Jeong, Y., Kang, A. & Woo, J., Deep Defense Against Mal-Doc: Utilizing Transformer and SeqGAN for Detecting and Classifying Document Type Malware, Applied Science. v.15 no.6, 2978, January 2025
Shin, M., Chang, S. Y., Kim, J., Park, K. & Kim, J., Trajectory-Driven Deep Learning for UAV Location Integrity Checks, IEEE Access. v.12, pp.178789-178804, November 2024
Song, J., Choi, S., Kim, J., Park, K., Park, C., Kim, J. & Kim, I., A Study of the Relationship of Malware Detection Mechanisms using Artificial Intelligence, ICT EXPRESS, v.10, no.3, pp.632-649, June 2024
Chang, S., Sarker, A., Wuthier, S., Kim, J., Kim, J. & Zhou, X., Base station gateway to secure user channel access at the first hop edge, Computer Networks. v.240, 110165, February 2024
Sarker, A., Wuthier, S., Kim, J., Kim, J. & Chang, S., Blockchain Handshaking with Software Assurance: Version++ Protocol for Bitcoin Cryptocurrency, Electronics. v.13, no.19, 3857, October 2024
Lew, K., Sarker, A., Wuthier, S., Kim, J., Kim, J. & Chang, S., Distributed Software Build Assurance for Software Supply Chain Integrity, Applied Sciences. v.14, no.20, 9262, October 2024
Chang, S., Park, K., Kim, J. & Kim, J., Flying Base Station Channel Capacity Limits: Dependent on Stationary Base Station and Independent of Positioning, Electronics. v.13, no.12, 2234, June 2024
Purification, S., Kim, J., Kim, J. & Chang, S., Fake Base Station Detection and Link Routing Defense, Electronics. v.13, no.17, 3474, September 2024
Kim, C., Chang, S., Kim, J., Lee, D. & Kim, J., Automated, Reliable Zero-Day Malware Detection Based on Autoencoding Architecture, IEEE Transactions on Network and Service Management. v.20, no.3, pp.3900-3914, September 2023
Purification, S., Kim, J., Kim, J., Kim, I. & Chang, S., Distributed and Lightweight Software Assurance in Cellular Broadcasting Handshake and Connection Establishment, Electronics. v.12, no.18, 3782, September 2023
Bang, I., Manya, V., Kim, J. & Kim, T., On the Effect of Malicious User on D2D Cluster: CSI Forgery and Countermeasures, IEEE Access. v.11, pp.5517-5527, January 2023
Kim, C., Chang, S., Lee, D., Kim, J., Park, K. & Kim, J., Reliable Detection of Location Spoofing and Variation Attacks, IEEE Access. v.11, pp.10813-10825, January 2023
Chang, S., Park, K., Kim, J. & Kim, J., Securing UAV Flying Base Station for Mobile Networking: A Review, Future Internet. v.15, no.5, 176, May 2023
Jeong, Y., Lee, S., Kim, J., Woo, J. & Kang, A., Malware Detection Using Byte Streams of Different File Formats, IEEE Access, v.10, pp.51041-51047, May 2022
Sarker, A., Byun, S., Raavi, M., Kim, J., Kim, J. & Chang, S., Dynamic ID randomization for user privacy in mobile network, ETRI Journal. v.44, no.6, pp.903-914, December 2022
Bang, I., Kim, J. & Kim, T., Physical-layer security enhancement using artificial noise for D2D communication in vehicular platooning networks, ICT Express. v.8, no.4, pp.600-605, December 2022
Song, J., Kim, J., Choi, S., Kim, J. & Kim, I., Evaluations of AI‐based malicious PowerShell detection with feature optimizations, ETRI Journal, v.43, no.3, pp.549-560, June 2021
Nakashima, M., Sim, A., Kim, Y., Kim, J. & Kim, J., Automated feature selection for anomaly detection in network traffic data, ACM Transactions on Management Information Systems. v.12, no.3, 3446636, September 2021
Choi, S., Bae, J., Lee, C., Kim, Y. & Kim, J., Attention-based automated feature extraction for malware analysis, Sensors. v.20, no.10, 2893, May 2020
Lee, J., Kim, J., Kim, I. & Han, K., Cyber Threat Detection Based on Artificial Neural Networks Using Event Profiles, IEEE Access, v.7, pp.165607-165626, November 2019
Kim, H., Kim, J., Kim, Y., Kim, I. & Kim, K., Design of Network Threat Detection and Classification based on Machine Learning on Cloud Computing, Cluster Computing, v.22, no.Supp.1, pp.2341-2350, January 2019
Kim, H., Kim, J., Kim, Y., Kim, I., Kim, K. & Kim, H., Improvement of Malware Detection and Classification using API Call Sequence Alignment and Visualization, Cluster Computing, v.22, no.Supp.1, pp.921-929, January 2019
Shin, S., Lee, J., Jeong, J., Kim, H., Kim, J., Kim, I. & Yoon, M., PrIDE: A Protocol-Independent De-Duplication Engine for Packet Recording, IEEE Network, v.30, no.6, pp.42-48, November 2016
Shin, S., Lee, J., Kim, J., Kim, I. & Yoon, M., Hash Table with Expanded-Key for High-Speed Networking, IEICE Transactions on Information and Systems, v.E99.D, no.3, pp.747-750, May 2016
Kim, H., Kim, J., Kim, J., Kim, I. & Chung, T., Feature-Chain Based Malware Detection Using Multiple Sequence Alignment of API Call, IEICE Transactions on Information and Systems, v.E99.D, no.4, pp.1071-1080, April 2016
Choi, S., Park, H., Lee, J., Kim, J. & Kim, I., Performance comparison of relational databases and columnar databases using bitmap index for fast search of 10Gbps network flows, Lecture Notes in Electrical Engineering. v.373, pp.171-175, December 2015
Seo, D., Kim, J., Lee, B. & Baek, J., Architecture for Dynamic Security Services in Overlay Network Environments, Information: An International Interdisciplinary Journal, v.17, no.5, pp.1877-1884, May 2014
Lim, S., Yi, O. & Kim, J., Quality of Protection for Multimedia Services via Wireless Mesh Networks, Information: An International Interdisciplinary Journal, v.16, no.7(B), pp.5145-5158, July 2013
Jung, S., Kim, J. & Kim, S., Network Modeling and Energy-Efficiency Optimization for Advanced Machine-to-Machine Sensor Networks, Sensors, v.12, no.11, pp.14851-14861, November 2012
Song, J., Jung, S., Kim, J., Seo, D. & Kim, S., Research on a Denial of Service (DoS) Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment, Sensors, v.10, no.11, pp.10376-10386, November 2010
Kim, J., Radhakrishnan, S. & Jang, J., Cost Optimization in SIS Model of Worm Infection, ETRI Journal, v.28, no.5, pp.692-695, October 2006
Domestic Journal
Kim, J., & Park, K., Design of a Security Architecture and Prototype Implementation for UxNB in 6G Mobile Networks, Journal of the Korean Internet and Information Society, v.26, no.3, pp.35–46, June 2025
Manya, V., Kim, T., Kim, J., & Bang, I., QoS Degradation Attack in D2D Multicasting Networks: Analysis and Countermeasure, Journal of the Korean Institute of Communications and Information Sciences, v.49, no.6, pp.807–815, June 2024
Park, C., Park, K., Song, J., Kim, J., & Kim S., Study on Trusted Models and Intelligent Intrusion Detection Systems for 6G Mobile Networks, Electronics and Telecommunications Trends (ETRI), v.39, no.5, pp.74–85, October 2024
Bang I., Kim J., & Kim T., Secrecy Rate Analysis of Physical-Layer Security Technique for Cluster-Based D2D Communications, Journal of the Korean Institute of Communications and Information Sciences, v.48, no.10, pp.1215–1218, October 2023
Kim, K., Kim, J., Park, K., & Park, T., Study on UxNB Network Deployment Method toward Mobile IAB, Journal of The Korea Society of Computer and Information, v.28, no.12, pp.105–114, December 2023
Nah, J., Kim, J., & Park, J., Standardization Trends and Prospects for IMT-2030 Intelligent Security Monitoring, Journal of the Korean Institute of Information Security and Cryptology, v.33, no.4, pp.95–102, September 2023
Bang, I., Kim, J., & Kim, T., Physical-Layer Security for Vehicular Platooning Networks: Artificial Noise Generation with Optimal Power Allocation, Journal of Korean Institute of Communications and Information Sciences, v.47, no.5, pp.756–759, May 2022
Bang, I., Kim, J., Lee, S., & Kim, T., Performance Analysis of Secure Relaying Protocol Against an Untrusted Relay Node in V2V Networks, Journal of Korean Institute of Communications and Information Sciences, v.46, no.12, pp.2180–2183, December 2021
Yoon, S., Kim, J., Lee, S., & Kang, J., A Study on Improving the Demonstration Process in the Defense Area with AI Anti-virus System R&D Products, Journal of Korea Convergence Security, v.21, no.4, pp.31–39, October 2021
Park, J., Kim, J., Moon, D., & Kim, I., Features and Major Enhancements of 3GPP 5G Security Architecture, Journal of the Korean Institute of Information Security and Cryptology, v.29, no.5, pp.21–30, October 2019
Park, J., Kim, J., Kim, I., & Jin, S., Trends in Hyper-Connected Intelligent Infrastructure Security Technologies: Focus on Mobile Communication Security in the 5G Era, Electronics and Telecommunications Trends (ETRI), v.34, no.1, pp.36–48, February 2019
Bae, J., Lee, C., Choi, S., & Kim, J., Malware Detection Model Using Skip-Connected LSTM RNN, Journal of the Korean Institute of Information Science, v.45, no.12, pp.1233–1239, December 2018
Kang, A., Jeong, Y., Kim, S., Kim, J., Woo, J., & Choi, S., Detection of Malicious PDF Based on Document Structure Features and Stream Objects, Journal of The Korea Society of Computer and Information, v.23, no.11, pp.85–93, November 2018
Kang, S., Kim, Y., Kim, J., & Kim, H., Extended Processor Trace Decoder Architecture for Malware Detection, Journal of Convergence Security, v.18, no.5, pp.19–24, January 2018
Kim, H., Kim, Y., & Kim, J., A Study on Implementation of Real-Time Multiprocess Trace Stream Decoder, Journal of Convergence Security, v.18, no.5, pp.67–73, January 2018
Choi, S., Kim, Y., Kim, J., & Kim, I., Research Trends in Malware Detection Using Deep Learning, Journal of the Korean Institute of Information Security and Cryptology, v.27, no.3, pp.5–11, June 2017
Jeong, Y., Park, K., Kim, H., Kim, J., & Hyun, S., Machine Learning-Based Intrusion Detection System for Class Imbalanced Data, Journal of the Korean Institute of Information Security and Cryptology, v.27, no.6, pp.1385–1395, December 2017
Kim, J., Kim, H., & Kim, I., Trends in Cyber-Genomic Technologies for Responding to Malware, Electronics and Telecommunications Trends (ETRI), v.30, no.5, pp.118–128, October 2015
Choi, S., Lee, J., Choi, Y., Kim, J., & Kim, I., 10Gbps Network Traffic Storage and Real-Time Index Generation, Electronics and Telecommunications Trends (ETRI), v.30, no.4, pp.181–190, August 2015
Kim, J., Han, M., Lee, J., & Kim, I., Trends in Cyber Attack Traceback Techniques, Electronics and Telecommunications Trends (ETRI), v.29, no.1, pp.93–103, February 2014
Kim, J., Cyber Attack Response Technologies and Standardization, OSIA Standards & Technology Review Journal, v.27, no.2, pp.76–88, June 2014
Kim, J., Lim, S., Kim, I., Cho, H., & Roh, B., Technical Trends of Cyber Security with Big Data, Electronics and Telecommunications Trends (ETRI), v.28, no.3, pp.19–29, June 2013
Kim, J., & Kim, I., Trends in International Standardization of Cybersecurity at ITU-T SG17, Journal of the Korean Institute of Information Security and Cryptology, v.23, no.3, pp.19–27, June 2013
Kim, K., Lee, S., Kim, J., & Lee, B., A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure, Journal of the Institute of Electronics Engineers of Korea, v.50, no.2, pp.60–69, February 2013
Lim, S., Cho, J., Kim, J., & Lee, B., Feature Selection with PCA Based on DNS Query for Malicious Domain Classification, Journal of KIPS: Computer and Communication Systems, v.1, no.1, pp.55–60, October 2012
Lim, S., Kim, J., & Lee, B., Detecting Cyber Threat Domains Based on DNS Traffic, Journal of the Korean Institute of Communications and Information Sciences, v.37B, no.11, pp.1082–1089, November 2012
Kim, J., Seo, D., & An, G., Development and Standardization Trends of Cybersecurity Information Exchange Technologies, Journal of the Korean Institute of Information Security and Cryptology, v.22, no.2, pp.7–14, April 2012
Seo, D., An, G., Kim, J., & Seo, D., ESCORT: Secure P2P Protocol for Global Cooperation in Overlay Network Services, Journal of Security Engineering, v.8, no.6, pp.673–692, January 2011
Lee, Y., An, G., & Kim, J., Design of Collaborative Response Framework Based on the Security Information Sharing in the Inter-domain Environments, Journal of the Korea Institute of Information and Communication Engineering, v.15, no.3, pp.605–612, March 2011
An, G., Seo, D., Lim, S., Kim, J., Design and Implementation of Mechanism for Effectively Exchanging Cybersecurity Information between Independent Security Management Domains, Journal of Korean Institute of Communications and Information Sciences, v.36, no.12, pp.1489–1497, December 2011
Yi, S., Kim, J., & Seo, D., Technical Trends of DDoS Attacks and Defense in Cellular Network, Electronics and Telecommunications Trends (ETRI), v.26, no.6, pp.154–163, December 2011
Yu, J., Kim, J., & Na, J., Trends in Standardization of Integrated Security Management and Cyber Traceback Technologies, TTA Journal, pp.66–74, July 2008
Yu, J., Kim, G., Kim, J., & Na, J., Cyber Attack Traceback Technologies, Weekly Technology Trends, v.1328, pp.16–22, December 2007
International Conference
Park, J., Kim, J., Woo, S., Park, K., Kim, J. & Lee, J., “Experimental Approach to Internal Security Threats for 5G-Advanced Core Networks”, 35th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, September 2024
Chang, S., Park, K., Kim, J. & Kim, J., “Flying Base Station Channel Capacity”, 7th International Workshop on Systems and Network Telemetry and Analytics, SNTA, pp.24-31, June 2024
Purification, S., Wuthier, S., Kim, J., Kim, J. & Chang, S., “Fake Base Station Detection and Blacklisting”, 33rd IEEE International Conference on Computer Communications and Networks, ICCCN, July 2024
Song, J., Park, K., Park, C., Kim, J. & Kim, I., “Analyzing the container security threat on the 5G Core Network”, Silicon Valley Cybersecurity Conference, SVCC, pp.1-3, June 2024
Khan, Q., Purification, S., Cheruiyot, R., Kim, J., Kim, J. & Chang, S., “Toward Post-Quantum Digital Certificate for eSIM”, Silicon Valley Cybersecurity Conference, SVCC, June 2024
Purification, S., Park, K., Kim, J., Kim, J. & Chang, S., “Wireless Link Routing to Secure Against Fake Base Station in 5G”, Silicon Valley Cybersecurity Conference, SVCC, June 2024
Islam, A., Chang, S., Kim, J. & Kim, J., “Anomaly Detection in 5G using Variational Autoencoders”, Silicon Valley Cybersecurity Conference, SVCC, June 2024
Shin, M., Chang, S., Kim, J., Park, K. & Kim, J., “Intelligent Trajectory-based Approach to UAV Location Integrity Checks”, 33rd IEEE International Conference on Computer Communications and Networks, ICCCN, July 2024
Kim, C., Chang, S., Kim, J. & Kim, J., “An Empirical Evaluation of Autoencoding-Based Location Spoofing Detection”, 22nd IEEE International Conference on Machine Learning and Applications, ICMLA, pp.574-579, December 2023
Park, C., Park, K., Song, J. & Kim, J., “Distributed Learning-Based Intrusion Detection in 5G and Beyond Networks”, European Conference on Networks and Communications, EuCNC, pp.490-495, June 2023
Woo, S., Park, J., Kwon, S., Park, K., Kim, J. & Lee, J., “Simulation of Data Hijacking Attacks for a 5G-Advanced Core Network”, European Conference on Networks and Communications, EuCNC, pp.538-542, June 2023
Chang, S., Wuthier, S., Kim, J. & Kim, J., “Lightweight Software Assurance for Distributed Mobile Networking”, Congress in Computer Science, Computer Engineering, and Applied Computing, CSCE, pp.2332-2338, July 2023
Chang, S., Park, K., Kim, J. & Kim, J., “Towards Securing UAV Flying Base Station: Misplacement Impact Analyses on Battery and Power”, Systems and Network Telemetry and Analytics, SNTA, pp.3-8, July 2023
Sarker, A., Wuthier, S., Kim, J., Kim, J. & Chang, S., “Version++ Protocol Demonstration for Cryptocurrency Blockchain Handshaking with Software Assurance”, IEEE 20th Consumer Communications and Networking Conference, CCNC, pp.915-916, January 2023
Sarker, A., Wuthier, S., Kim, J., Kim, J. & Chang, S., “Version++: Cryptocurrency Blockchain Handshaking With Software Assurance”, IEEE 20th Consumer Communications & Networking Conference, CCNC, January 2023
Gamboni, T., Wuthier, S., Kim, J., Kim, J. & Chang, S., “Lightweight Code Assurance Proof for Wireless Software”, 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec, pp.285-287, May 2022
Kanuri, N. S., Chang, S., Park, Y., Kim, J. & Kim, J., “Impact of Location Spoofing Attacks on Performance Prediction in Mobile Networks”, Silicon Valley Cybersecurity Conference, SVCC, pp.107-119, August 2022
Bong, K. & Kim, J., “Analysis of Intrusion Detection Performance by Smoothing Factor of Gaussian NB Model Using Modified NSL-KDD Dataset”, International Conference on Information and Communication Technology Convergence, ICTC, pp.1471-1476, October 2022
Raavi, M., Wuthier, S., Sarker, A., Kim, J., Kim, J. & Chang, S., “Towards Securing Availability in 5G: Analyzing the Injection Attack Impact on Core Network”, Silicon Valley Cybersecurity Conference, SVCC, pp.143-154, August 2022
Bong, K. & Kim, J., “Security Use-cases for Countering Threats of CLA and UAV in 6G”, International Conference on Intelligent Computing and its Emerging Applications, ICEA, pp.10-15, December 2021
Kim, C., Chang, S., Kim, J., Lee, D. & Kim, J., “Zero-day Malware Detection using Threshold-free Autoencoding Architecture”, IEEE International Conference on Big Data, pp.1279-1284, December 2021
Al Olaimat, M., Lee, D., Kim, Y., Kim, J. & Kim, J., “A Learning-based Data Augmentation for Network Anomaly Detection”, 29th International Conference on Computer Communications and Networks, ICCCN, August 2020
Song, J., Kim, J., Kim, J., Kim, I. & Choi, S., “Implementation of a Static PowerShell Analysis based on the CNN-LSTM Model with Token Type Optimizations”, World Conference on Information Security Applications, WISA, pp.99-107, August 2019
Kim, Y., Kim, J., Kim, I. & Kim, H., “Real-time Multi-process Tracing Decoder Architecture”, ACM Workshop on Systems and Network Telemetry and Analytics, SNTA, pp.49-52, June 2019
Song, J., Kim, J., Kim, Y., Kim, J., Kim, I. & Choi, S., “Deep Learning based PowerShell Analysis with the Abstract Syntax Tree”, USENIX Security Symposium, pp.1-1, August 2019
Kim, T., Suh, S., Kim, H., Kim, J. & Kim, J., “An Encoding Technique for CNN-based Network Anomaly Detection”, IEEE International Conference on Big Data, pp.2960-2965, December 2018
Kim, Y., Kim, J. & Kim, J., “Intelligent Security Event Threat Ticket Management System on Secure Cloud Security Infrastructures being able to Dynamic Reconfiguration”, International Conference on Multimedia and Ubiquitous Engineering, MUE/LNEE 518, pp.1-6, November 2018
Choi, S., Kim, Y. & Kim, J., “Similarity Hash Index”, International Conference on Information and Communication Technology Convergence, ICTC, pp.1298-1300, October 2018
Lee, J., Kim, Y., Kim, J. & Kim, I., “Toward the SIEM Architecture for Cloud-based Security Services”, Conference on Communications and Network Security, CNS, pp.1-2, October 2017
Kim, J., Kim, J. & Kim, I., “Netflow Based HTTP Get Flooding Attack Analysis, International Conference on Emerging Security Information”, The 11th International Conference on Emerging Security Information, Systems and Technologies, SECURWARE, pp.39-40, September 2017
Choi, S., Choi, Y., Lee, J., Kim, J. & Kim, I., “Network abnormal behaviour analysis system”, International Conference on Information and Communication Technology Convergence, ICTC, pp.49-52, October 2017
Choi, S., Jang, S., Kim, Y. & Kim, J., “Malware Detection using Malware Image and Deep Learning”, International Conference on Information and Communication Technology Convergence, ICTC, pp.1194-1196, October 2017
Lee, J., Kim, Y., Kim, J., Kim, I. & Han, K., “Building a Big Data Platform for Large-scale Security Data Analysis”, International Conference on Information and Communication Technology Convergence, ICTC, pp.976-980, October 2017
Choi, Y., Lee, J., Choi, S., Kim, J. & Kim, I., “Introduction to a Network Forensics System for Cyber Incidents Analysis”, International Conference on Advanced Communication Technology, ICACT, pp.50-55, February 2016
Choi, S., Lee, J., Choi, Y., Kim, J. & Kim, I., “Hierarchical Network Signature Clustering and Generation”, International Conference on Information and Communication Technology Convergence, ICTC, pp.1191-1193, October 2016
Lee, J., Choi, S., Choi, Y., Kim, J. & Kim, I., “A Forensically Robust Data Acquisition from a 10G Line-rate Network”, International Conference on Information and Communication Technology Convergence, ICTC, pp.1188-1190, October 2016
Choi, Y., Lee, J., Choi, S., Kim, J. & Kim, I., “Traffic Storing and Related Information Generation System for Cyber Attack Analysis”, International Conference on Information and Communication Technology Convergence, ICTC, pp.1052-1057, October 2016
Kim, J., “Visualization of Malware Detection Based on API Call Sequence Alignment”, International Conference on Internet, ICONI, pp.175-178, December 2016
Kim, J., Choi, Y. & Lee, J., “Network Intrusion Forensics System based on Collection and Preservation of Attack Evidence”, International Conference on Security Technology, SecTech, pp.354-359, November 2016
Kim, H., Kim, J. & Kim, I., “Implementation of Malware Detection System Based on Behavioral Sequences”, International Conference on Security Technology, SecTech, pp.348-353, November 2016
Choi, Y., Lee, J., Choi, S., Kim, J. & Kim, I., “Transmitted File Extraction and Reconstruction from Network Packets”, World Congress on Internet Security, WorldCIS, pp.164-165, October 2015
Lee, J., Choi, S., Choi, Y., Kim, J., Kim, I. & Lee, Y., “A Cyber Blackbox for Collecting Network Evidence”, SRI Security Congress, pp.141-147, November 2015
Kim, J., Lee, J., Choi, Y., Choi, S. & Kim, I., “Cyber Black Box: Network Intrusion Forensics System for Collecting and Preserving Evidence of Attack”, SRI Security Congress, pp.104-110, November 2015
Kim, H., Kim, J., Kim, I. & Chung, T., “Behavior-Based Anomaly Detection on Big Data”, SRI Security Congress, pp.73-80, November 2015
Son, M., Min, O., Kim, J. & Baek, S., “A Safer Way to Share a Car based on SNS to Increase Use Efficiency of Released Vehicles”, International Carnahan Conference on Security Technology, ICCST, pp.1-6, October 2014
Lim, S., Kim J. & Kim I., “Prediction Model for Botnet-Based Cyber Threats Using DNS Traffic Analysis”, International Conference on Networked Computing and Advanced Information Management, NCM, pp.502-507, June 2013
Kim, J., Kim, Y. & Kim, I., “Cooperative Security Monitoring System”, Workshop on Visualization for Cyber Security, VizSec, pp.1-2, October 2013
Lim, S., Yun, S., Kim, J. & Lee, B., “Prediction Model for Botnet-based Cyber Threats”, International Conference on Information and Communication Technology Convergence, ICTC, pp.340-341, October 2012
Jung, S., Kim, J. & Kim, S., “A Study on Shift Right Cyclic Exclusive-OR Packet Marking Method”, International Conference on Sensor and Its Applications, SIA/CCIS 338, v.338, pp.36-41, November 2012
Jung, S., Kim, J. & Kim, S., “Novel Compositing Method for Quantification of Wireless Network Security”, International Conference on Security Technology, SecTech/CCIS 339, v.339, pp.1-6, November 2012
Jung, S., Kim, J. & Kim, S., “Study on 4-Step BASE Mechanism Vulnerability Analysis and Design of Evasion Attack Method for Smart Network”, Business, Economics, Financial Sciences, and Management, BEFM, pp.417-422, November 2011
Seo, D., An, G., Kim, J. & Baek, J., “Scalable Wireless Network Security for Bluetooth in Global Collaborative Environment”, International Conference on Ubi-media Computing, U-Media, pp.1-6 July 2011
Jung, S., Kim, J. & Kim, S., “A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment”, International Conference on Advanced Communication and Networking, ACN, v.199, pp.31-35, August 2011
An, G., Seo, D., Kim, J., Kim, K. & Seo, D., “Context-based Remote Security Control for Mobile Communication Device”, International Symposium on Communications and Information Technologies, ISCIT, pp.815-820, October 2010
Song, J., Kim, J., Seo, D. & Kim, S., “Design of a Forecasting Service System for Monitoring of Vulnerabilities of Sensor Networks”, International Conference on Security-Enriched Urban Computing and Smart Grid, SUComS, v.78, pp.34-38, October 2010
Jung, S., Kim, J., Cagalaban, G., Lim, J. & Kim, S., “Design of Cyber Attack Precursor Symptom Detection Algorithm through System base Behavior Analysis and Memory Monitoring”, International Conference on Future Generation Communication and Networking, FGCN, v.120, pp.276-283, December 2010
Song, J., Kim, J., Seo, D., Soh, W. & Kim, S., “Study of Host-Based Cyber Attack Precursor Symptom Detection Algorithm”, International Conference on Future Generation Communication and Networking, FGCN, v.120, pp.268-275, December 2010
Kim, J. & Na, J., “An Efficient Algorithm for Intrusion Source Identification”, International Conference on Networked Computing and Advanced Information Management, NCM, pp.188-190, September 2008
Lee, J., Han, Y., Kim, J., Na, J. & Chung, T., “PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain”, KES International Symposium on Agent and Multi-Agent Systems, KES-AMSTA/LNCS 4496, v.4496, pp.833-840, May 2007
Jung, S., Lee, J., Han, Y., Kim, J., Na, J. & Chung, T., “SNMP-based Integrated Wire/wireless Device Management System”, International Conference on Advanced Communication Technology, ICACT, pp.995-998, February 2007
Kim, J., Na, J. & Jang, J., “Optimal Control of Filtering Treatment for Internet Worm”, International Technical Conference on Circuits/Systems, Computers and Communications, ITC-CSCC, pp.392-393, July 2007
Domestic Conference
김준식, 김종현, “상호 위장 기반 MTD 모델의 시뮬레이션 및 게임이론적 평가”, 한국정보보호학회 하계종합학술발표회, pp.1000-1002, 2025.06
김수창, 김종현, “Open RAN에서 안전한 xApp 도입을 위한 보안 절차”, 전자정보통신학술대회(CEIC), pp.1-3, 2023.12
송지현, 박경민, 박철희, 김종현, 김익균, “머신러닝을 이용한 크립토재킹 컨테이너 탐지 성능 분석”, 한국컴퓨터 종합학술대회, pp.1294-1296, 2023.06
봉기정, 김종현, “변형한 NSL-KDD Dataset을 활용한 Gaussian NB 모델의 smoothing 계수에 따른 침입 탐지 성능 분석”, 한국정보보호학회 하계종합학술발표회, pp.1-4, 2022.06
봉기정, 김종현, “개선된 데이터 마이닝 기법을 이용한 악성코드 탐지 연구 동향”, 한국통신학회 하계종합학술발표회, pp.1026-1027, 2021.06
최선오, 박현욱, 이주영, 최양서, 김종현, “10Gbps 네트워크 플로우 고속 검색을 위한 관계형 데이터 베이스와 컬럼기반 데이터 베이스의 성능 비교”, 한국통신학회 하계종합학술발표회, pp.1538-1539, 2015.06
최양서, 김종현, 이주영, 최선오, 김익균, “2Gbps 급 트래픽 처리를 위한 네트워크 포렌식 장비 설계 및 구현”, 한국통신학회 하계종합학술발표회, pp.1597-1598, 2015.06
이주영, 최선오, 최양서, 김종현, 김익균, “사이버 블랙박스를 통해 수집된 네트워크 데이터 분석 고찰”, 한국통신학회 하계종합학술발표회, pp.1595-1596, 2015.06
이주영, 최선오, 김종현, 김익균, “사이버 침해 사고 조사를 위한 포렌식 프레임워크 제안”, 정보 및 제어 학술대회 (CICS), pp.449-451, 2014.10
최선오, 이주영, 최양서, 김종현, 김익균, “사이버 블랙박스에 기반한 공격 원인 분석 알고리즘”, 한국정보처리학회 추계학술발표대회, pp.392-394, 2014.11
임선희, 김종현, 이병길, “사이버 위협 사전 인지 및 분석 기술 연구”, 한국통신학회 하계종합학술발표회, pp.121-122, 2012.06
서대희, 백장미, 안개일, 김종현, “공격 근원지 및 유포지 추적에 관한 연구”, 한국통신학회 추계종합학술발표회, pp.654-655, 2011.10
안개일, 서대희, 임선희, 김종현, 서동일, 조현숙, “독립적인 도메인간 사이버 보안 정보 공유 협상을 위한 참조 모델”, 한국정보보호학회 충청지부 학술대회, pp.1-5, 2011.09
이상우, 김종현, 서동일, “통합 보안 관제 시스템을 위한 봇넷 탐지 방법 분석”, 대한전자공학회 하계종합학술대회, pp.224-226, 2011.06
서대희, 백장님, 안개일, 김종현, “Edge 라우터 기반의 근원지 추적에 관한 연구”, 한국통신학회 하계종합학술발표회, pp.648-649, 2011.06
안개일, 김종현, “독립적인 보안 관리 도메인간 보안 정보 공유 시스템의 설계”, 차세대 통신소프트웨어 학술대회(NCS), pp.1-5, 2010.05
김종명, 정수진, 이종혁, 정태명, 김종현, 나중찬, “SDMM: 유무선 통합 환경에서의 보안 단말 관리 시스템”, 한국정보처리학회 추계학술대회, pp.1505-1508, 2006.11
Patents & Technology Transfers
International Patents
Apparatus and method for rewarding reconfigurable intelligent surface infrastructure sharing based on blockchain, U.S.A. Application No. 18/408765, 2024-01-10
Apparatus and method for updating internet-based malware detection engine using scaling control of virtual machine, U.S.A. Application No. 18/335813, 2023-06-15
Method and apparatus for detecting unknown malware based on an assembly language model, U.S.A. Application No. 18/056141, 2022-11-16
Apparatus for detecting unknown malware using variable opcode sequence and method using the same, U.S.A. Application No. 17/461337, 2021-08-30, Patent No. 11790085, 2023-10-17
Apparatus and method for detecting malicious script , U.S.A. Application No. 17/100541, 2020-11-20, Patent No. 11783034, 2023-10-10
Method and apparatus for detecting cyber threats using deep neural network, U.S.A. Application No. 16/202869, 2018-11-28
Method and apparatus for analyzing traffic based on flow in cloud system, U.S.A. Application No. 16/206662, 2018-11-30, Patent No. 10841194, 2020-11-17
Apparatus and method for visualization of sequential data for comparison and characterization, U.S.A. Application No. 15/860828, 2018-01-03, Patent No. 10509796, 2019-12-17
Apparatus and method for detecting malware code, U.S.A. Application No. 15/240319, 2016-08-18, Patent No. 10007789 , 2018-06-26
System and method for interlocking of intrusion information, U.S.A. Application No. 15/246027, 2016-08-24
Apparatus and method for recording network traffic, U.S.A. Application No. 15/360957, 2016-11-23
Apparatus and method for real-time reconstruction of transmitted file in broadband network environment, U.S.A. Application No. 15/331436, 2016-10-21, Patent No. 10404782, 2019-09-03
Evidence data storing apparatus for incident analysis and method thereof, U.S.A. Application No. 14/937498, 2015-11-10
Apparatus and method for generating process activity profile, U.S.A. Application No. 14/802688, 2015-07-17
Method and system for network connection-chain traceback using network flow data, U.S.A. Application No. 14/635962, 2015-03-02, Patent No. 9537887, 2017-01-03
Apparatus for analyzing the attack feature DNA and method thereof, U.S.A. Application No. 14/596188, 2015-01-13
Method and apparatus for quantifying threat status for recognizing network threat, U.S.A. Application No. 13/902069, 2013-05-24
Method and apparatus for visualizing network security state, U.S.A. Application No. 13/721236, 2012-12-20, Patent No. 9130981, 2015-09-08
Agent device and method for sharing security information based on anonymous identifier between security management domains, U.S.A. Application No. 13/493120, 2012-06-11, Patent No. 8789200, 2014-07-22
Information sharing system and method between heterogeneous service provider, U.S.A. Application No. 13/473515, 2012-05-16
Apparatus for controlling security condition of a global network, U.S.A. Application No. 13/295359, 2011-11-14
Apparatus and method for quantitatively evaluating security policy, U.S.A. Application No. 13/324482, 2011-12-13
Apparatus for sharing security information among network domains and method for the same, U.S.A. Application No. 13/182972, 2011-07-14
Method and apparatus for visualizing network security state, U.S.A. Application No. 13/198215, 2011-08-04
Apparatus and method of managing objects and events by using vector based geographic information system, U.S.A. Application No. 12/782891, 2010-05-19
Apparatus for detecting network attack based on visual data analysis and its method thereof, U.S.A. Application No. 12/630672, 2009-12-03
Apparatus and method for detecting user connection information by client-side script, U.S.A. Application No. 12/603010, 2009-10-21
Apparatus for monitoring the security status in wireless network and method thereof, U.S.A. Application No. 12/482716, 2009-06-11
Web based traceback system and method by using reverse caching proxy, U.S.A. Application No. 12/467462, 2009-05-18, Patent No. 8341721, 2012-12-25
Web based traceback system and method by using reverse caching proxy, JAPAN Application No. 111201, 2009-04-30, Patent No. 5001976, 2012-05-25
GIS based network information monitoring system, U.S.A. Application No. 12/471005, 2009-05-22
Apparatus and method for divided visualizing IP address, PCT Application No. PCT/KR2008/005175, 2008-09-03
Apparatus and method for divided visualizing IP address, U.S.A. Application No. 12/808890, 2010-06-17
Apparatus and method for visualizing network state by using geographic information, PCT Application No. PCT/KR2007/005903, 2007-11-22
Apparatus and method for visualizing network state by using geographic information, U.S.A. Application No. 12/679294, 2010-03-19, Patent No. 8266278, 2012-09-11
Log-based traceback system and method by using the centroid decomposition technique, PCT Application No. PCT/KR2007/005859, 2007-11-21
Log-based traceback system and method by using the centroid decomposition technique, U.S.A. Application No. 12/669633, 2010-01-19, Patent No. 8307441, 2012-11-06
Apparatus and method for sampling based on contents of security events, PCT Application No. PCT/KR2007/005797, 2007-11-19
Apparatus of content-based sampling for security events and method thereof, U.S.A. Application No. 12/667130, 2009-12-29, Patent No. 8140671, 2012-03-20
Method and apparatus for indicating network state, PCT Application No. PCT/KR2008/001298, 2008-03-07
Method and apparatus for indicating network state, U.S.A. Application No. 12/530193, 2010-02-19
Apparatus for visualizing network state by using traffic flow-radar and method thereof, PCT Application No. PCT/KR2007/005258, 2007-10-24
Apparatus for visualizing network state by using traffic flow-radar and method thereof, U.S.A. Application No. 12/517091, 2009-06-01, Patent No. 8019865, 2011-09-13
Apparatus and method for visualizing network situation using security cube, PCT Application No. PCT/KR2007/004043, 2007-08-23
Apparatus and method for visualizing network situation using security cube, U.S.A. Application No. 12/516494, 2009-05-27, Patent No. 8014310, 2011-09-06
Domestic Patents
도커 컨테이너를 위한 eBPF/XDP 기반 네트워크 침입 탐지 방법, 출원번호 0039417, 2024-03-21
Open RAN에서의 ARP 스푸핑 방지를 위한 ARP 테이블 관리 장치 및 서비스, 출원번호 0039415, 2024-03-21
5G-Advanced SA 코어 네트워크 과부하 방지를 위한 NF 컨테이너 인스턴스 생성 방법, 출원번호 0031999, 2024-03-06
Open RAN에서의 응용 프로그램 검증 방법 및 시스템, 출원번호 0152645, 2023-11-07
드론 기지국에서의 전력 소모량 모니터링을 통한 포지셔닝 방해 공격 인식 방법, 출원번호 0141138, 2023-10-20
블록체인 기반 RIS 인프라 공유에 대한 보상 시스템 및 방법, 출원번호 0117466, 2023-09-05
Open RAN에서의 신규 응용 프로그램 도입 검증 방법 및 시스템, 출원번호 0177803, 2023-12-08
악성코드 분류 시각화 장치 및 방법, 출원번호 0022995, 2023-02-21
가상 머신 스케일링을 이용한 인터넷 기반 악성 코드 탐지 엔진 업데이트 장치 및 방법, 출원번호 0123255, 2022-09-28
악성코드 탐지 방법 및 장치, 출원번호 0082551, 2022-07-05
어셈블리 언어 모델 기반 악성코드 탐지 방법 및 장치, 출원번호 0059945, 2022-05-17
다중 학습 모델을 이용한 5G 엣지 네트워크 침입 탐지 장치 및 이를 이용한 방법, 출원번호 0146690, 2021-10-29, 등록번호 2604380, 2023-11-16
가변 길이 명령코드를 이용한 알려지지 않은 악성코드 탐지 장치 및 이를 이용한 방법, 출원번호 0060608, 2021-05-11, 등록번호 2524207, 2023-04-18
대규모 범주형 값에 대한 Spatial Pyramid Average Pooling, 출원번호 0095391, 2020-07-30
시계열 데이터 분석을 이용한 네트워크 이상징후 탐지 방법 및 장치, 출원번호 0032547, 2020-03-17
실환경에서 악성 파일을 탐지하는 시스템 및 악성 파일의 탐지를 위한 데이터 세트 생성 방법, 출원번호 0159678, 2019-12-04
악성 스크립트 탐지 장치 및 방법, 출원번호 0013795, 2020-02-05, 등록번호 2665757, 2024-05-08
STIX/TAXII를 이용한 엔드포인트 비정상행위 탐지 및 분석 시스템, 출원번호 0153005, 2018-11-30
악성 파일 탐지 방법 및 장치, 출원번호 0153916, 2018-12-03
보안 이벤트를 처리하기 위한 위협 티켓 발행 방법 및 장치, 출원번호 0078435, 2018-07-05
심층 신경망을 이용한 사이버 위협 탐지 방법 및 장치, 출원번호 0071694, 2018-06-21, 등록번호 2153992, 2020-09-03
클라우드 환경에서 서비스 체이닝을 제공하는 방법 및 장치, 출원번호 0075047, 2018-06-28, 등록번호 2071031, 2020-01-21
넷플로우 정보를 이용한 클라우드 기반 암호화 트래픽 분석 시스템 및 그 방법, 출원번호 0045289, 2018-04-18, 등록번호 2045844, 2019-11-12
보안 장비, 보안 위협 분석 장치 및 방법, 출원번호 0164302, 2017-12-01, 등록번호 2384672, 2022-04-05
악성코드 이미지와 딥러닝을 이용한 악성코드 탐지장치, 출원번호 0130810, 2017-10-11
암호화 프로세싱 인지를 통한 랜섬웨어 실시간 탐지 기법 및 그 장치, 출원번호 0047591, 2018-04-24, 등록번호 2145289, 2020-08-11
네트워크 패킷 검색 장치 및 방법, 출원번호 0029410, 2017-03-08
네트워크 패킷의 중복 데이터 제거 장치 및 그 방법, 중복제거파일 복원 장치, 출원번호 0026173, 2017-02-28
침해사고 증거 수집 및 보존을 위한 사이버 블랙박스 장치, 출원번호 0030729, 2017-03-10
네트워크 유사 악성행위 탐지 장치 및 방법, 출원번호 0028369, 2017-03-06
네트워크 보안 기능 가상화 기반의 클라우드 보안 분석 장치, 보안 정책 관리 장치 및 보안 정책 관리 방법, 출원번호 0010978, 2017-01-24, 등록번호 2088308, 2020-03-06
순차적 데이터의 비교 및 특징화를 위한 순차적 데이터 시각화 장치 및 방법, 출원번호 0012135, 2017-01-25, 등록번호 2575974, 2023-09-04
네트워크 기반의 악성 파일 탐지 장치 및 방법, 출원번호 0010974, 2017-01-24
네트워크 악성행위 분석 장치 및 방법, 출원번호 0134971, 2016-10-18
악성 코드 탐지 장치 및 방법, 출원번호 0032041, 2016-03-17
침해사고 정보 연동 시스템 및 방법, 출원번호 0018460, 2016-02-17
네트워크 트래픽 기록 장치 및 그 방법, 출원번호 0017135, 2016-02-15, 등록번호 1953548, 2019-02-25
광대역 네트워크 환경을 위한 실시간 전송 파일 재구성 장치 및 방법, 출원번호 0016959, 2016-02-15, 등록번호 1948622, 2019-02-11
시그니처 클러스터링 및 생성 장치, 출원번호 0015058, 2016-02-05
악성 코드를 탐지하기 위한 전자 시스템 및 방법, 출원번호 0020976, 2015-02-11, 등록번호 2045772, 2019-11-12
사이버 블랙박스 시스템 및 그 방법, 출원번호 0006016, 2015-01-13, 등록번호 2059688, 2019-12-19
사이버 블랙박스에 기반한 공격 원인 분석 알고리즘, 출원번호 0002821, 2015-01-08
사이버 침해 사고 조사 장치 및 방법, 출원번호 0009473, 2015-01-20, 등록번호 2061833, 2019-12-26
프로세스 행위 프로파일 생성 장치 및 방법, 출원번호 0170485, 2014-12-02, 등록번호 2128047, 2020-06-23
네트워크 플로우 데이터를 이용한 네트워크 연결 체인 역추적 방법 및 시스템, 출원번호 0027202, 2014-03-07, 등록번호 1889500, 2018-08-10
공격특성 DNA 분석 장치 및 그 방법, 출원번호 0012271, 2014-02-03, 등록번호 1940512, 2019-01-15
학습 가능한 DNS 분석기 및 분석 방법, 출원번호 0102239, 2012-09-14
실시간 공격 근원지 및 유포지 추적을 위한 파일 다중 분석 장치 및 방법, 출원번호 0102177, 2012-09-14, 등록번호 1523934, 2015-05-22
네트워크 위협 사전인지를 위한 위협상황 정량화 방법 및 장치, 출원번호 0022675, 2013-03-04
네트워크 보안 상황 시각화 방법 및 그 장치, 출원번호 0074733, 2012-07-09, 등록번호 1868893, 2018-06-12
비정상 호스트의 비정상도 정량화 장치 및 그 방법, 출원번호 0073225, 2012-07-05
보안관리 도메인들 간에 익명 식별자 기반의 보안정보를 공유하기 위한 에이전트 장치 및 방법, 출원번호 0124760, 2011-11-28, 등록번호 1575282, 2015-12-01
네트워크 공격 탐지 및 대응 장치, 네트워크 공격 탐지 및 대응 방법, 출원번호 0117300, 2011-11-11, 등록번호 1775514, 2017-08-31
공격 근원지 및 공격 유포지 추적 방법 및 시스템, 출원번호 0114286, 2011-11-04
사이버 위협 사전 예측 장치 및 방법, 출원번호 0103255, 2011-10-10, 등록번호 1538374, 2015-07-15
이기종 서비스 제공자간의 정보 공유 시스템 및 방법, 출원번호 0094309, 2011-09-19
전역 네트워크 보안상황 제어 장치 및 방법, 출원번호 0134108, 2010-12-23
정량적 보안 정책 평가 장치 및 방법, 출원번호 0132217, 2010-12-22
네트워크 도메인간 보안정보 공유 장치 및 방법, 출원번호 0107238, 2010-10-29, 등록번호 1425107, 2014-07-24
네트워크 보안관제 시스템 및 방법, 네트워크 보안관제를 위한 보안 이벤트 처리 장치 및 시각화 처리 장치, 출원번호 0118632, 2010-11-26
백터 기반 GIS를 이용한 객체 및 이벤트 관리 장치 및 방법, 출원번호 0114752, 2009-11-25
위치 송출 기능이 없는 장비의 건물 내 위치 표시 장치 및 방법, 출원번호 0105114, 2009-11-02
지리 정보를 이용한 도메인 보안 상황 표시 장치 및 표시 방법, 출원번호 0100758, 2009-10-22
공격자 패킷 역추적 방법 및 이를 위한 시스템, 출원번호 0097313, 2009-10-13
비주얼 데이터 분석 기반의 네트워크 공격 탐지 장치 및 그 방법, 출원번호 0069418, 2009-07-29, 등록번호 1219538, 2013-01-02
클라이언트 기반 스크립트를 이용한 사용자 정보 추출 장치 및 방법, 출원번호 0032429, 2009-04-14
웹 서버를 이용한 사용자 단말기의 인증, 및 IP 위조 검출 방법, 출원번호 0116357, 2008-11-21, 등록번호 1554340, 2015-09-14
무선 네트워크에서 보안 상황 감시 장치, 출원번호 0131716, 2008-12-22, 등록번호 1003104, 2010-12-15
시스템 이상 상태 감시 장치 및 방법, 출원번호 0128070, 2008-12-16
리버스 캐싱 프록시를 이용한 웹 기반의 역추적 시스템, 출원번호 0074727, 2008-07-30, 등록번호 0960111, 2010-05-19
스파이 봇 에이전트를 이용한 네트워크 공격 위치 추적 방법 및 시스템, 출원번호 0100299, 2008-10-13, 등록번호 1003094, 2010-12-15
도메인 간 협력을 이용하는 추적 시스템, 출원번호 0099298, 2008-10-09
GIS 기반의 네트워크 정보 표시 장치, 출원번호 0074726, 2008-07-30, 등록번호 0979200, 2010-08-25
아이피 주소 분할 표시 장치 및 방법, 출원번호 0133083, 2007-12-18, 등록번호 0949803, 2010-03-19
지리 정보를 활용한 관리 도메인의 보안 상황 표시 장치 및 방법, 출원번호 0108789, 2007-10-29, 등록번호 0949805, 2010-03-19
지리 정보를 이용한 네트워크 상태 표시 장치 및 방법, 출원번호 0096537, 2007-09-21, 등록번호 0925176, 2009-10-29
중심점 분할 기법을 이용한 로그 기반의 역추적 시스템 및 방법, 출원번호 0073059, 2007-07-20, 등록번호 0922582, 2009-10-13
보안 이벤트의 컨텐츠에 기반한 보안 이벤트 샘플링 장치 및 방법, 출원번호 0067268, 2007-07-04, 등록번호 0901696, 2009-06-02
정책 기반 관리 프레임워크에서의 정책 관리 방법 및 그 장치, 출원번호 0065556, 2007-06-29
침해사건 공유 장치 및 방법, 그리고 이를 포함하는 네트워크 보안 시스템, 출원번호 0034102, 2007-04-06, 등록번호 0862194, 2008-10-01
네트워크 상태 표시 장치 및 방법, 출원번호 0022971, 2007-03-08, 등록번호 0856924, 2008-08-29
네트워크 보안 상황 표시 장치 및 그 방법, 출원번호 0121829, 2006-12-04, 등록번호 0885293, 2009-02-17
보안 큐브를 이용한 네트워크 상태 표시장치 및 그 방법, 출원번호 0117566, 2006-11-27, 등록번호 0826884, 2008-04-25
정책 기반 관리 프레임워크에서 정책 클라이언트의 정책 적용 대상 결정 방법, 출원번호 0096570, 2006-09-29, 등록번호 0786392, 2007-12-10
네트워크 수준의 웜, 바이러스 조기 탐지 방법 및 장치, 출원번호 0107959, 2006-11-02
대규모 네트워크에서의 보안 관리 방법 및 장치, 출원번호 0108893, 2006-11-06, 등록번호 0832536, 2008-05-20
보안 기능 시험을 위한 침입 탐지 이벤트 생성 방법 및 장치, 출원번호 0112962, 2006-11-15, 등록번호 0772177, 2007-10-25
Technology Transfers
AI-LGBM기반 PE 악성코드 분석 및 시각화 기술 (2022)
AI기반 PE 악성코드 분석 및 시각화 도구 기술 (2021)
언어모델 기반 악성코드 정적 분석 기술 (2021)
AI 기반 엣지 네트워크 침해위협 분석 및 탐지 플랫폼 기술 (2021)
Hex-Opcode를 활용한 AI기반 PE 악성코드 분석 기술 (2020)
실환경에서의 악성/정상파일 실시간 트레이스 자동 수집 및 AI 분석 기술 (2019)
위지위그 기반 클라우드 보안 서비스 통합제어 기술 (2018)
지능형 SIEM 을 위한 인공신경망기반 데이터 분석 및 탐지 기술 (2018)
딥러닝을 이용한 악성파일 탐지기술 (2017)
분산 환경 기반 대용량 보안이벤트 처리 및 연관성 분석 기술 (2017)
네트워크 전송 실행파일 재구성 기술 (2017)
네트워크 트래픽 수집 및 증거 보존을 위한 사이버 블랙박스 기술 (2016)
사이버 표적공격 추적 기술 (2016)
사이버블랙박스 기반의 침해사고 원인분석 도구 (2015)
악성코드 비정상 행위 동적 분석 및 시각화 기술 (2015)
사이버블랙박스의 실행파일 수집 및 재구성 기술 (2014)
호스트 행위기반 악성코드 탐지 기술 (2014)
인터넷레이더 3D 시각화 기술 (2013)
3D 시각화 기반 네트워크 위협요소 인지 및 추적 기술 (2012)
3D 시각화 기반 통합보안제어 기술 (2010)
실공간 기반 와이파이망의 보안상황인지 기술 (2010)
사이버공격 패턴 자동 검출 기반 감시 기술 (2009)
웹 클라이언트 접속 경로 추적기 (2008)
IP주소와 고정밀 GIS 정보와의 매핑기 (2008)
지능형 사이버 공격 감시 기술 (2007)
HD 시각화 기반의 네트워크 공격상황 분석 기술 (2006)
LD 차원 시각화 기반의 네트워크 공격상황 분석 기술 (2005)
Professional Activities
2021.01 ~ 현재: 과기부 5G보안협의회 표준분과 분과장
2010.01 ~ 현재: TTA PG503(사이버보안) 부의장
2010.01 ~ 현재: ITU-T SG17연구반 위원
2022.01 ~ 현재: ITU-R WP5D연구반 위원
2010.01 ~ 현재: ICT 표준화 전략맵 차세대보안분과 위원
2010.01 ~ 현재: ICT국제표준전문가 & ICT표준자문 전문가
2021.01 ~ 2024.12: ITU-T SG17 WP1 부의장
2012.03 ~ 2024.12: ITU-T SG17 Q4 라포처
2022.03 ~ 2024.03: 과총(KOFST) 기술교류회 정보통신 기술자문 위원
2022.03 ~ 2023.12: KISA 개인정보기술포럼 표준분과 위원
2021.01 ~ 2023.12: 과기부 5G보안포럼 기술표준분과 분과장
Awards
(기관장 표창) TTA 우수 표준자문 전문가 수상, 정보통신기술협회, 2022
(기관장 표창) 2022년도 ICT R&D 우수연구자 수상, 정보통신기획평가원, 2022
(기관장 표창) ETRI 10대 대표기술 최우수상 수상, 한국전자통신연구원, 2022
(기관장 표창) ITU 국제표준화 우수위원 수상, 국립전파연구원, 20220
(기관장 표창) ETRI MAN상 수상, 한국전자통신연구원, 2019
(장관 표창) 2016 대한민국 기술대상 표창, 산업통상자원부, 2016
(장관 표창) 정보보안 산업발전 표창, 지식경제부, 2012
Notices & Announcements
Research Seminars
Weekly laboratory seminars on cutting-edge security topics. Graduate students and faculty welcome to participate in discussions on 5G/6G security challenges.
Student Opportunities
Seeking motivated undergraduate and graduate students for research participation in 6G mobile security projects. Application deadline approaching.
Special Lectures
Upcoming invited lectures and external presentations on emerging security threats in 6G networks. Registration required for workshop attendance.
Contact Information
Office Location
Sejong University Chungmu Hall 407A 209 Neungdong-ro, Gwangjin-gu Seoul, South Korea
Direct Contact
Phone: 02-3408-3712 Email:[email protected] Lab Website: Visit our research portal Office Hours: By appointment
Consultation & Visits
Schedule meetings for research collaboration, student advising, or industry partnerships. Please contact in advance to arrange consultation sessions and laboratory tours.