Top / Jungsuk Song

Basic Information

  • Name: Jungsuk Song
  • Address: 245 Daehangno, Yuseong-gu, Daejeon, 305-806, Korea
  • Tel: +82-42-869-0729 (hot line)
  • Fax: +82-42-869-1119
  • E-mail: song AT kisti.re.kr

Current Position

  • Senior Researcher at KISTI (Korea Institute of Science and Technology Information), Daejeon, Korea
  • Associate Professor at UST (Korea University of Science and Technology), Daejeon, Korea

Research Topics and Interests

  • Security Monitoring and Response
  • Honeynet and Darknet
  • Automated Verification of IDS Alerts
  • Visualization of IDS Alerts
  • Spam and Malicious Web Sites Analysis
  • IPv6 Security Issues
  • Network Security
  • Data Mining, Machine Learning

Work Experence

  • Sep. 2014 - Present
    Associate Professor, Korea University of Science and Technology (UST), Korea
  • Sep. 2012 - Aug. 2014
    Assistant Professor, Korea University of Science and Technology (UST), Korea
  • Oct. 2011 - Present
    Senior Researcher (tenure-track), Korea Institute of Science and Technology Information (KISTI), Korea
  • Oct. 2010 - Sep. 2011
    Researcher (tenure-track), National Institute of Information and Communications Technology (NICT), Japan
  • Apr. 2009 - Sep. 2010
    Expert Researcher (full-time), National Institute of Information and Communications Technology (NICT), Japan
  • Apr. 2008 - Sep. 2008
    Part-time Instructor, Information Science and Technology, Osaka Institute of Technology
  • Apr. 2008 - Mar. 2009
    Part-time Instructor, Kyoto Prefectural University
  • Jun. 2006 - Dec. 2006
    Research Assistant, Department of Networking Research
    Academic Center for Computing and Media Studies , Kyoto University

Education

  • Apr. 2006 - Mar. 2009
    Ph.D. in Informatics, Kyoto University
    Thesis: Studies on High-Performance Network Intrusion Detection System Based on Unsupervised Machine Learning
    Advisor: Yasuo Okabe
  • Apr. 2005 - Mar. 2006
    Research student
    Department of Intelligence Science and Technology
    Graduate School of Informatics, Kyoto University
  • Mar. 2003 - Feb. 2005
    M.S. in Information, Korea Aerospace University
    Thesis: An RTSD System against Various Attacks for Low False Positive Rate Based on Patterns of Attacker’s Behaviors
    Advisor: Yongjin Kwon
  • Mar. 1998 - Feb. 2003
    B.S. in Telecommunication and Information, Korea Aerospace University

Professional Activities

  • Associate editor of IEICE Transactions on Communications since May. 2010
  • Member of IPv6 Technical Verification Consortium since (Sep. 2010 ~ Sep. 2011)
  • Organizing Chair of DMC 2011, 2012, 2013
  • PC member of SAINT Workshop - NETSAP 2010, 2011, 2012, 2013
  • PC member of IMIS 2013(Track of Security, Trust and Privacy)

Awards and Scholarships

  • Apr. 2008 - Mar. 2009
    Honors Scholarship, Japan Student Services Organization (JASSO)
  • Second Prize at 2003 Goyang-city Software Contest, Korea

Technical Skills

  • Programming languages: C, C++, Perl, SQL, MATLAB, etc.

Languages

  • English
  • Japanese
  • Korean(native speaker)

Memberships

  • IEEE, IEICE

Publications

Book Chapters

  1. Jungsuk Song, Hiroki Takakura, Yasuo Okabe and Yongjin Kwon, Correlation Analysis Between Honeypot Data and IDS Alerts Using One-class SVM, Intrusion Detection Systems, InTech Open Access Publisher, pp.173-192, Mar. 2011.(pdf is available here)

Referred Journal Papers

  1. Jungsuk Song, Sang-Soo Choi, Younsu Lee, Seokhun Kim, Sookyun Kim, Practical In-Depth Analysis of IDS Alert for Tracing and Identifying Potential Attackers on Darknet, Electronic Research Commerce Journal, Submitted.

  2. Sang-Soo Choi, Jungsuk Song, Seokhun Kim and Sookyun Kim, A Model of Analyzing Cyber Threats Trend and Tracing Potential Attackers Based on Darknet Traffic, Security Comm. Networks. doi: 10.1002/sec.796, Accepted.

  3. Jungsuk Song, Takayuki Itoh, GilHa? Park, Hiroki Takakura, An Advanced Security Event Visualization Method for Identifying Real Cyber Attacks, Applied Mathematics & Information Sciences(AMIS), 2013, Accepted

  4. Haeng-Gon Lee, Jungsuk Song, Sang-Soo Choi and Gi-Hwan Cho, An Advanced Incident Response Methodology Based on Correlation Analysis of Polymorphic Security Events, IEICE Transactions on Communications, Vol.E96-B,No.07,pp.1803-1813,Jul. 2013.

  5. Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Koji Nakao, Toward a More Practical Unsupervised Anomaly Detection System, Information Sciences (Elsevier), Vol.231, pp.4-14, May. 2013.

  6. Junji NAKAZATO, Jungsuk SONG, Masashi ETO, Daisuke INOUE, and Koji NAKAO, A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads, IEICE Transactions on Information and Systems (Special Section on Information and Communication System Security), Vol.E94-D,No.11,pp.2150-2158,Nov. 2011.(pdf is available here)

  7. Hyung Chan KIM, Tatsunori ORII, Katsunari YOSHIOKA, Daisuke INOUE, Jungsuk SONG, Masashi ETO, Junji SHIKATA, Tsutomu MATSUMOTO, and Koji NAKAO, An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation, IEICE Transactions on Information and Systems, Vol.E94-D,No.9,pp.1778-1791,Sep. 2011.(pdf is available here)

  8. Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim and Koji Nakao, O-means : An Optimized Clustering Method for Analyzing Spam Based Attacks, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (Special Section on Cryptography and Information Security), Vol.E94-A, No.1, pp.245-254, Jan. 2011.(pdf is available here)

  9. Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Daisuke Inoue, Masashi Eto, Koji Nakao, A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data, IEICE Transactions on Information and Systems, Vol.E93-D,No.9,pp.2544-2554, Sep. 2010.(pdf is available here)

  10. Kenji Ohira, Jungsuk Song, Hiroki Takakura and Yasuo Okabe, Construction and Operation of a Generic Honeypot System to Detect Attack Activities on Various Applications, IEICE Transactions on Information and Systems, Vol.J93-D, No.7, pp.1125-1134, Jul. 2010. (In Japanese, pdf is available here)

  11. Jungsuk Song, Hiroki Takakura, Yasuo Okabe and Yongjin Kwon, Unsupervised Anomaly Detection Based on Clustering and Multiple One-class SVM, IEICE Transactions on Communications, Vol.E92-B, No.6, pp.1981-1990, Jun. 2009. (pdf is available here)

  12. Jungsuk Song, Kenji Ohira, Hiroki Takakura, Yasuo Okabe and Yongjin Kwon, A Clustering Method for Improving Performance of Anomaly-based Intrusion Detection System, IEICE Transactions on Information and Systems (Special Section on Information and Communication System Security), Vol.E91-D, No.5, pp.1282-1291, May. 2008. (pdf is available here)

  13. J. Song and Y. Kwon, An RTSD System against Various Attacks for Low False Positive Rate Based on Patterns of Attacker's Behaviors, IEICE Transactions on Information and Systems, Vol. E89-D, No. 10, pp. 2637-2643, Oct. 2006. (pdf is available here)

  14. J. Song and Y. Kwon, A Real Time Scan Detection System against Attacks based on Port Scanning Techniques, Journal of KISS(Korea Information Science Society):Information Networking, Vol. 31, No. 2, pp. 171-178, Apr. 2004.(In Korean)

Referred Symposium, Conference, and Workshop Papers

  1. Heeseok Kim, Sang-Soo and Jungsuk Song, A Methodology for Multipurpose DNS Sinkhole Analyzing Double Bounce Emails, 20th International Conference on Neural Information Processing(ICONIP 2013), LNCS, pp.--, Daegu, Korea, November 3-7, 2013.

  2. Jungsuk Song, Jang-Won Choi, Sang-Soo Choi, A Malware Collection and Analysis Framework Based on Darknet Traffic, 19th International Conference on Neural Information Processing(ICONIP 2012), LNCS 7664, pp.624-631, Doha, Qatar, November 12-15, 2012.

  3. Jungsuk Song, Jumpei Shimamura, Masashi Eto, Daisuke Inoue, Koji Nakao, Correlation Analysis between Spamming Botnets and Malware Infected Hosts, SAINT 2011 Workshop on Network Technologies for Security, Administration and Protection (NETSAP), IEEE CS Press, pp.372-375, Munich, Germany, 18-22 July 2011.(pdf is available here)

  4. Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue and Koji Nakao, Statistical Analysis of Honeypot Data and Building of Kyoto 2006+ Dataset for NIDS Evaluation, Workshop on development of large scale security-related data collection and analysis initiatives(BADGERS 2011), ACM, pp.29-36, Salzburg, Austria, 10-13 April 2011.(pdf is available here)

  5. Masashi Eto, Daisuke Inoue, Jungsuk Song, Junji Nakazato, Kazuhiro Ohtaka, Koji Nakao, nicter : A Large-Scale Network Incident Analysis System, Workshop on development of large scale security-related data collection and analysis initiatives(BADGERS 2011), ACM, pp.37-45, Salzburg, Austria, 10-13 April 2011.(pdf is available here)

  6. Jungsuk Song, Masashi Eto, Hyung Chan Kim, Daisuke Inoue and Koji Nakao, A Heuristic-based Feature Selection Method for Clustering Spam Emails, 17th International Conference on Neural Information Processing(ICONIP 2010), LNCS 6443, Part I, pp.290-297, Sydney, Australia, 22-25 November 2010. (pdf is available here)

  7. Junji Nakazato, Jungsuk Song, Masashi Eto, Daisuke Inoue and Koji Nakao, A Malware Classi fication Method Based on Threaded Function Call Traces, The 5th Joint Workshop on Information Security (JWIS 2010), pp.52-66, Guangzhou, China, 5-6 August 2010. (pdf is available here)

  8. Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song and Koji Nakao, On the Applicability of a DBI-Based Generic Unpacking Implementation, The 5th Joint Workshop on Information Security (JWIS 2010), pp.331-345, Guangzhou, China, 5-6 August 2010. (pdf is available here)

  9. Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim and Koji Nakao, An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers, SAINT 2010 Workshop on Network Technologies for Security, Administration and Protection (NETSAP), IEEE CS Press, pp. 257-260, Seoul, Korea, 19-23 July 2010. (pdf is available here)

  10. Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song and Koji Nakao, How to Locate a Target Binary Process and Its Derivatives in System Emulator, SAINT 2010 Workshop on Convergence Security and Privacy (CSnP), IEEE CS Press, pp. 273-276, Seoul, Korea, 19-23 July 2010. (pdf is available here)

  11. Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song and Koji Nakao, Working Towards a Primary Binary Analysis System, The 2010 International Conference on Security and Management (SAM2010), pp. 459-465, Las Vegas, USA, 12-15 July 2010. (pdf is available here)

  12. Jungsuk Song, Daisuke Inoue, Masashi Eto, Mio Suzuki, Satoshi Hayashi and Koji Nakao, A Methodology for Analyzing Overall Flow of Spam-based Attacks, 16th International Conference on Neural Information Processing(ICONIP 2009), LNCS 5864, pp. 556-564, Bangkok, Thailand, 1-5 December 2009. (pdf is available here)

  13. Jungsuk Song, Hiroki Takakura and Yongjin Kwon, A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts, The 2008 International Symposium on Applications and the Internet(SAINT2008), IEEE CS Press, pp. 51-56, Turku, FINLAND, 28 July - 1 Aug. 2008. (pdf is available here)

  14. Jungsuk Song, Hiroki Takakura and Yasuo Okabe, Cooperation of Intelligent Honeypots to Detect Unknown Malicious Codes, WOMBAT Workshop on Information Security Threat Data Collection and Sharing (WISTDCS 2008), IEEE CS Press, pp. 31-39, Amsterdam, Netherlands, 21-22 April 2008. (pdf is available here)

  15. Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira and Yongjin Kwon, A Comprehensive Approach to Detect Unknown Attacks via Intrusion Detection Alerts, The twelfth Asian Computing Science Conference(ASIAN2007) Focusing on Computer and Network Security, LNCS 4846, pp. 247-253, Doha, Qatar, 9-11 December 2007. (pdf is available here)

  16. Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Yongjin Kwon, A Robust Feature Normalization Scheme and an Optimized Clustering Method for Anomaly-based Intrusion Detection System, Proc. 12th International Conference on Database Systems for Advanced Applications (DASFAA2007),(Lecture Notes in Computer Science 4443), pp. 140-151, Bangkok, Thailand, 9-12 April 2007. (pdf is available here)

  17. J. Song and Y. Kwon, A Visual RTSD System against Various Attacks for Low False Positive Rate Based on Patterns of Attacker's Behaviors, Pre-Proceedings of the 5th International Workshop on Information Security Applications (WISA 2004), Vol. 5, pp. 695-704, Jeju-island, Korea, 23-25 August 2004.

Technical Reports and Oral Presentations

  1. Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao, A Preliminary Investigation for Analyzing Network Incidents Caused by Spam, The Symposium on Cryptography and Information Security (SCIS2010), Takamatsu, Japan, Jan. 19-22, 2010.

  2. Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao, An Extended QEMU Emulator for Primary Binary Analysis, The Symposium on Cryptography and Information Security (SCIS2010), Takamatsu, Japan, Jan. 19-22, 2010.

  3. Hyung Chan Kim, Daisuke Inoue, Masashi Eto, Jungsuk Song, Koji Nakao, An Implementation of a Generic Unpacking Method on Bochs Emulator, Proc. of the Computer Security Symposium 2009 (CSS2009), vol. 2, pp. 997-1002, 26-28 October 2009.

  4. Hiroki Takakura, Jungsuk Song, Takayuki Ito, How 77DDoS attack observed in the Japanese Internet, International Workshop on DDoS Attacks and Defenses, KAIST-ICC, Daejeon, Korea, September 29-30, 2009.

  5. Jungsuk Song, Hiroki Takakura, Yasuo Okabe, A Network Intrusion Detection System Based on Clustering and Multiple One-class SVM, 12th Core University Program Seminar on Next Generation Internet Technologies, Beppu, Japan, Feb. 2009.

  6. Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Performance Evaluation of Unsupervised Machine Learning Techniques for Intrusion Detection, 11th Core University Program Seminar on Next Generation Internet Technologies, Busan, Korea, Aug. 2008.

  7. Hiroki Takakura and Jungsuk Song, Situation of Zero-Day Attacks on the Internet and their Detection Method,SIG-FPAI-A801-05, July 4, 2008.(in Japanese).

  8. Jungsuk Song, Hiroki Takakura, Yasuo Okabe, Data Mining and Visualization of IDS Alerts to Extract Malicious Activities, 9th Core University Program Seminar on Next Generation Internet Technologies, Oct. 2007.

  9. Jungsuk Song, Hiroki Takakura, Yasuo Okabe, A Proposal of New Benchmark Data to Evaluate Mining Algorithms for Intrusion Detection, 23th APAN Meeting in Manila, Jan. 2007.

  10. Hayato Ohba, Jungsuk Song, Hiroki Takakura and Yasuo Okabe, Analysis and Visualization of Network IDS Data Using Machine Learning, IEICE Technical Report, vol. 106, no. 465, IA2006-36, pp. 31-36, Jan. 2007.(in Japanese)

  11. Kenji Ohira, Jungsuk Song, Hiroki Takakura and Yasuo Okabe, A Construction Method of a Honeypot System to Safely Collect Unknown alicious Codes, IEICE Technical Report, vol. 106, no.62, IA2006-1, pp. 1-6, May 2006.(in Japanese)

  12. J. Song, H. Takakura, Y. Okabe, Y. Kwon, A Study on Accuracy Improvement of Intrusion Detection System Based on Data Mining, In Proceedings of KISS (Korea Information Science Society) Korea Computer Congress 2005 , Vol.32, No.1, pp.208-210, July 6-8, 2005.

Hobbies

  • Watching Computer Games, Especially Starcraft
  • Playing and Watching Soccer
  • Watching Baseball

Dreams

Song Microsystems CEO

Links

Last-modified: 2014-08-28 (木) 17:57:23 (1202d)