Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–4 of 4 results for author: Hong, J B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.17458  [pdf, ps, other

    cs.CR cs.LG

    Expectations Versus Reality: Evaluating Intrusion Detection Systems in Practice

    Authors: Jake Hesford, Daniel Cheng, Alan Wan, Larry Huynh, Seungho Kim, Hyoungshick Kim, Jin B. Hong

    Abstract: Our paper provides empirical comparisons between recent IDSs to provide an objective comparison between them to help users choose the most appropriate solution based on their requirements. Our results show that no one solution is the best, but is dependent on external variables such as the types of attacks, complexity, and network environment in the dataset. For example, BoT_IoT and Stratosphere I… ▽ More

    Submitted 28 March, 2024; v1 submitted 26 March, 2024; originally announced March 2024.

    Comments: 10 pages

    MSC Class: 68M25; 68M20 ACM Class: C.4; D.m

  2. Model-based Cybersecurity Analysis: Past Work and Future Directions

    Authors: Simon Yusuf Enoch, Mengmeng Ge, Jin B. Hong, Dong Seong Kim

    Abstract: Model-based evaluation in cybersecurity has a long history. Attack Graphs (AGs) and Attack Trees (ATs) were the earlier developed graphical security models for cybersecurity analysis. However, they have limitations (e.g., scalability problem, state-space explosion problem, etc.) and lack the ability to capture other security features (e.g., countermeasures). To address the limitations and to cope… ▽ More

    Submitted 24 May, 2021; v1 submitted 18 May, 2021; originally announced May 2021.

    Comments: 10 pages

    Journal ref: 2021 Annual Reliability and Maintainability Symposium (RAMS)

  3. Composite Metrics for Network Security Analysis

    Authors: Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Dong Seong Kim

    Abstract: Security metrics present the security level of a system or a network in both qualitative and quantitative ways. In general, security metrics are used to assess the security level of a system and to achieve security goals. There are a lot of security metrics for security analysis, but there is no systematic classification of security metrics that are based on network reachability information. To ad… ▽ More

    Submitted 17 July, 2020; v1 submitted 7 July, 2020; originally announced July 2020.

    Comments: 21 pages journal

    Journal ref: Software Networking, 2018(1), 137-160

  4. arXiv:1903.04271  [pdf, ps, other

    cs.CR

    CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing

    Authors: Seoungmo An, Taehoon Eom, Jong Sou Park, Jin B. Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim

    Abstract: Cloud computing has been adopted widely, providing on-demand computing resources to improve perfornance and reduce the operational costs. However, these new functionalities also bring new ways to exploit the cloud computing environment. To assess the security of the cloud, graphical security models can be used, such as Attack Graphs and Attack Trees. However, existing models do not consider all ty… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.