Sunoh Choi
YOU?
Author Swipe
View article: Detecting AI-Generated Network Traffic Using Transformer–MLP Ensemble
Detecting AI-Generated Network Traffic Using Transformer–MLP Ensemble Open
The rapid growth of generative artificial intelligence (AI) has enabled diverse applications but also introduced new attack techniques. Similar to deepfake media, generative AI can be exploited to create AI-generated traffic that evades ex…
View article: Anomaly Detection and Analysis in Nuclear Power Plants
Anomaly Detection and Analysis in Nuclear Power Plants Open
Industries are increasingly adopting digital systems to improve control and accessibility by providing real-time monitoring and early alerts for potential issues. While digital transformation fuels exponential growth, it exposes these indu…
View article: Analysis of Vulnerabilities in College Web-Based System
Analysis of Vulnerabilities in College Web-Based System Open
Web-based systems are used extensively in Korea because web standards have been adapted by the law (e.g., Electronic Government Act). Users can easily access web-based systems if they are connected to the Internet. However, distinguishing …
View article: A study of the relationship of malware detection mechanisms using Artificial Intelligence
A study of the relationship of malware detection mechanisms using Artificial Intelligence Open
Implementation of malware detection using Artificial Intelligence (AI) has emerged as a significant research theme to combat evolving various types of malwares. Researchers implement various detection mechanisms using shallow and deep lear…
View article: Novel Feature Extraction Method for Detecting Malicious MQTT Traffic Using Seq2Seq
Novel Feature Extraction Method for Detecting Malicious MQTT Traffic Using Seq2Seq Open
Owing to their wide application, Internet of Things systems have been the target of malicious attacks. These attacks included DoS, flood, SlowITe, malformed, and brute-force attacks. A dataset that includes these attacks was recently relea…
View article: Similar Word Replacement Method for Improving News Commenter Analysis
Similar Word Replacement Method for Improving News Commenter Analysis Open
In Korea, it is common to read and comment on news stories on portal sites. To influence public opinion, some people write comments repeatedly, some of which are similar to those posted by others. This has become a serious social issue. In…
View article: Internet News User Analysis Using Deep Learning and Similarity Comparison
Internet News User Analysis Using Deep Learning and Similarity Comparison Open
Nowadays, many Korean users read news from portal sites like Naver and Daum. Users can comment on news articles on such sites, and some try to influence public opinion through their comments. Therefore, news users need to be analyzed. This…
View article: Malicious Powershell Detection Using Graph Convolution Network
Malicious Powershell Detection Using Graph Convolution Network Open
The internet’s rapid growth has resulted in an increase in the number of malicious files. Recently, powershell scripts and Windows portable executable (PE) files have been used in malicious behaviors. To solve these problems, artificial in…
View article: Evaluations of AI‐based malicious PowerShell detection with feature optimizations
Evaluations of AI‐based malicious PowerShell detection with feature optimizations Open
Cyberattacks are often difficult to identify with traditional signature‐based detection, because attackers continually find ways to bypass the detection methods. Therefore, researchers have introduced artificial intelligence (AI) technolog…
View article: Malicious PowerShell Detection Using Attention against Adversarial Attacks
Malicious PowerShell Detection Using Attention against Adversarial Attacks Open
Currently, hundreds of thousands of new malicious files are created daily. Existing pattern-based antivirus solutions face difficulties in detecting such files. In addition, malicious PowerShell files are currently being used for fileless …
View article: Combined kNN Classification and Hierarchical Similarity Hash for Fast Malware Detection
Combined kNN Classification and Hierarchical Similarity Hash for Fast Malware Detection Open
Every day, hundreds of thousands of new malicious files are created. Existing pattern-based antivirus solutions have difficulty detecting these new malicious files. Artificial intelligence (AI)–based malware detection has been proposed to …
View article: Attention-Based Automated Feature Extraction for Malware Analysis
Attention-Based Automated Feature Extraction for Malware Analysis Open
Every day, hundreds of thousands of malicious files are created to exploit zero-day vulnerabilities. Existing pattern-based antivirus solutions face difficulties in coping with such a large number of new malicious files. To solve this prob…
View article: Service Identification Method for Encrypted Traffic Based on SSL/TLS
Service Identification Method for Encrypted Traffic Based on SSL/TLS Open
네트워크 트래픽이 복잡, 다양해짐에 따라 발생하는 네트워크 보안문제 해결을 위해 다양한 암호화 프로토콜 중 하나인 SSL/TLS가 널리 사용되고 있다. 하지만 현재의 트래픽 분석 시스템은 암호화 트래픽을 프로토콜 레벨에 한정적으로 분석하고 있는 실정이다. 효과적인 네트워크 자원 관리를 위해서는 암호화 트래픽에 대한 서비스 단위 분석이 요구된다. 본 논문에서는 SSL/TLS 암호화 응용 트래픽의 페이로드 시그니쳐를 자동으로 추…
View article: Cyber Black Box: Network intrusion forensics system for collecting and preserving evidence of attack
Cyber Black Box: Network intrusion forensics system for collecting and preserving evidence of attack Open
Once the system is compromised, the forensics and investigation are always executed after the attacks and the loss of some useful instant evidence. Since there is no log information necessary for analyzing an attack cause after the cyber i…
View article: Cyber Blackbox for collecting network evidence
Cyber Blackbox for collecting network evidence Open
In recent years, the hottest topics in the security field are related to the advanced and persistent attacks. As an approach to solve this problem, we propose a cyber blackbox which collects and preserves network traffic on a virtual volum…