Young-Hoon Goo

Orcid: 0000-0002-3013-7011

According to our database1, Young-Hoon Goo authored at least 26 papers between 2015 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
HTTP and DNS traffic traces for experimenting of protocol reverse engineering methods.
Dataset, May, 2022

2021
ScienceIoT: Evolution of the Wireless Infrastructure of KREONET.
Sensors, 2021

Flow based Sequential Grouping System for Malicious Traffic Detection.
KSII Trans. Internet Inf. Syst., 2021

A message keyword extraction approach by accurate identification of field boundaries.
Int. J. Netw. Manag., 2021

2020
Two-Pathway Model for Enhancement of Protocol Reverse Engineering.
KSII Trans. Internet Inf. Syst., 2020

Clustering method in protocol reverse engineering for industrial protocols.
Int. J. Netw. Manag., 2020

An Automatic Protocol Reverse Engineering Approach from the Viewpoint of the TCP/IP Reference Model.
Proceedings of the 21st Asia-Pacific Network Operations and Management Symposium, 2020

2019
Automatic Payload Signature Update System for the Classification of Dynamically Changing Internet Applications.
KSII Trans. Internet Inf. Syst., 2019

Protocol Specification Extraction Based on Contiguous Sequential Pattern Algorithm.
IEEE Access, 2019

A Method for Extracting Static Fields in Private Protocol Using Entropy and Statistical Analysis.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

Best Feature Selection using Correlation Analysis for Prediction of Bitcoin Transaction Count.
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019

2018
A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View.
Secur. Commun. Networks, 2018

Inference of network unknown protocol structure using CSP(Contiguous Sequence Pattern) algorithm based on tree structure.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Network attack traffic detection using seed based sequential grouping model.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Framework for precise protocol reverse engineering based on network traces.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

The Method of Clustering Network Traffic Classifications for Extracting Payload Signature by Function.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

Network Attack Traffic Detection for Calculating Correlation of the Flow.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

A Study on the Method to Extract Clear Fields From the Private Protocol.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

2017
Survey on network protocol reverse engineering approaches, methods and tools.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

SigManager: Automatic payload signature management system for the classification of dynamically changing internet applications.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

Sky-Scope : Skype application traffic identification system.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

A traffic grouping method using the correlation model of network flow.
Proceedings of the 19th Asia-Pacific Network Operations and Management Symposium, 2017

2016
Finding the highly efficient application signature through payload signature quality evaluation.
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016

Whitelist representation for FTP service in SCADA system by using structured ACL model.
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016

Payload signature structure for accurate application traffic classification.
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016

2015
A method for service identification of SSL/TLS encrypted traffic with the relation of session ID and Server IP.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015


  Loading...