Research Areas
--DongSeong Kim's research.
**Current Research topics**
Security modeling
*Selected (related) publications- Jing Hong and Dong Seong Kim, "Scalable Security Model Generation and Analysis using k-importance Measure" In Proc. of the 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013), Sep 2013.
- Jing Hong, Tad Takaoka and Dong Seong Kim "Scalable Attack Representation Model Using Logic Reduction Techniques" in Proc. of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013), Jul. 2013
- Jing Hong and Dong Seong Kim, "Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures" in Proc. of the 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSNW 2013), Jun. 2013
- Jing Hong and Dong Seong Kim, "Performance analysis of scalable attack representation models" in Proc. of the 28th IFIP TC-11 International Information Security and Privacy Conference (SEC 2013), Jul. 2013
- Jing Hong and Dong Seong Kim, "HARMs: Hierarchical Attack Representation Models for Network Security Analysis" in Proc. of the 10th Australian Information Security Management Conference in SECAU Security Congress (SECAU 2012), Dec. 2012
- Arpan Roy, Dong Seong Kim, Kishor S. Trivedi: Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. DSN 2012
- Arpan Roy, Dong Seong Kim, Kishor S. Trivedi, ACT: Towards unifying the constructs of attack and defense trees, Security and Communication Networks (SCN), 2011.
- Jong Sou Park, Yoon Kyung Suh, Seulki Lee, Jang-Se Lee, Dong Seong Kim, Assessing Vulnerability and Risk of Sensor Networks under Node Compromise, J. of Information Assurance, 7(4), 2008.
- Arpan Roy, Dong Seong Kim, Kishor S. Trivedi, Cyber Security Analysis using Attack Countermeasure Trees, The Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW) 2010.
- Kishor S. Trivedi, Dong Seong Kim, Arpan Roy, Deep Medhi, Dependability and Security Models, In Proc. DRCN 2009.
- Jang-Se Lee, Dong Seong Kim, Jong Sou Park and Sung-Do Chi, "Design of Intelligent Security Management System using Simulation-based Analysis", Artificial Intelligence, LNAI, Springer Verlag.
- Young Seob Son, Dong Seong Kim, Jong Sou Park, Assessing the Impact Level of Countermeasure by Quantitative Estimation of Risk Factor, Proc. of The 16th Workshop on Information Security and Cryptography (WISC): 915-921 (2004)
- Jong Sou Park, Si-baek Kim, Young-Woo Nam, Dong Seong Kim, Young-sub Son, The Implementation of Intelligent Enterprise Security Management System's Prototype, Proc. of 15th Workshop on Information Security and Cryptography(WISC), 2003
- Arpan Roy, Dong Seong Kim, Kishor S. Trivedi, ACT: Attack Countermeasure Trees for Information Assurance Analysis, InfoCom 2010 Student workshop.
Resilience modeling and analysis
*Selected (related) publications- Rahul Ghosh, Dong Seong Kim, Kishor S. Trivedi, System Resiliency Quantification Using Non-state-space and State-space Analytic Models, Rel. Eng. & Sys. Safety 116: 109-125 (2013)
- Kishor S. Trivedi, Rahul Ghosh, Dong Seong Kim, An Analytic Approach for Resiliency Quantification of Systems, The Seventh International Conference on "Mathematical Methods in Reliability"- Theory. Methods. Applications. (MMR 2011), pp. 882-888.
- Kishor S. Trivedi, Dong Seong Kim, Rahul Ghosh, Resilience in Computers Systems and Networks, In Proc. IEEE/ACM ICCAD, San Jose, November 2009.
Availability and Performability modeling and analysis of Cloud/Data Centers
*Selected (related) publications- Fumio Machida, Dong Seong Kim, Kishor S. Trivedi: Modeling and analysis of software rejuvenation in a server virtualized system with live VM migration. Perform. Eval. 70(3): 212-230 (2013)
- Rubens de S. Matos, Paulo Romero Martins Maciel, Fumio Machida, Dong Seong Kim, Kishor S. Trivedi: Sensitivity Analysis of Server Virtualized System Availability. IEEE Transactions on Reliability 61(4): 994-1006 (2012)
- Ji Ho Kim, Sang Min Lee, Dong Seong Kim, Jong Sou Park, Performability Analysis of IaaS Cloud, The Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2011)
- Fumio Machida, Dong Seong Kim, Kishor S. Trivedi, Modeling and Analysis of Software Rejuvenation in a Server Virtualized System, In Proc. Int. Workshop on Software Aging and Rejuvenation (WoSAR), IEEE Computer Society, 2010.
- Fumio Machida, Ermeson Andrade, Dong Seong Kim, Kishor S. Trivedi, Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML, in Proc. The 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011).
- Rahul Ghosh, Kishor S. Trivedi, Vijay Naik, Dong Seong Kim, End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach, Proc. of 16th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2010)
- Dong Seong Kim, Fumio Machida, Kishor S. Trivedi, Availability Modeling and Analysis of a Virtualized System, Proc. of 15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC2009), Dec., 2009.
- Fumio Machida, Dong Seong Kim, Jong Sou Park, Kishor S. Trivedi, Toward Optimal Virtual Machine Placement and Rejuvenation Scheduling in a Virtualized Data Center, In Proc. Int. Workshop on Software Aging and Rejuvenation, IEEE Computer Society, 2008.
- Dong Seong Kim, Fumio Machida, Kishor S. Trivedi, Availability Analysis of a Virtualized Data Center, Proc. ICVCI 2009, NC, USA.
- Rahul Ghosh, Kishor S. Trivedi, Vijay K. Naik, Dong Seong Kim, Interacting Markov Chain Based Hierarchical Approach for Cloud Services, IBM Research Report, RC24985(W1004-120), April, 2010.
- Rahul Ghosh, Kishor S. Trivedi, Vijay K. Naik, Dong Seong Kim, Interacting Stochastic Models Approach for Performability Analysis of IaaS Cloud in RC25050, 2010.
- Rahul Ghosh, Kishor S. Trivedi, Vijay K. Naik, Dong Seong Kim, End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach in RC25006, 2010.
- V. K. Naik, M. Devarakonda, R. Ghosh, D. S. Kim and K. S. Trivedi, "SLA Driven Capacity Planning for Cloud Based Systems", abstract in INFORMS 2010 Annual Meeting, Austin.
Availability/Dependability modeling framework
*Selected (related) publications- K. S. Trivedi, Dong Seong Kim, R. Ghosh, System Availability Assessment Using Stochastic Models, Applied Stochastic Models in Business and Industry, accepted for publication, 2012.
- Paulo R. M. Maciel, Kishor S. Trivedi, Rivalino Matias Jr., Dong Seong Kim, Dependability Modeling, book chapter in Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, Eds. Valeria Cardellini, Emiliano Casalicchio, Kalinka Regina LucasJaquie Castelo Branco, Julio Cezar Estrella and Francisco Jose Monaco, IGI Global, 2011
- Kishor S. Trivedi, Dong Seong Kim, Xiaoyan Yin, Multi-State Availability Modeling in Practice, book chapter in Recent Advances in System Reliability: Signature, Multi-state Systems and Statistical Inference, Eds. Anatoly Lisnianski, Ilia Frenkel, Springer, 2011.
- Kishor S. Trivedi, R. Mansharamani, Dong Seong Kim, M. Grottke, M. Nambiar, Recovery from Failures due to Mandelbugs in IT Systems. Pasadena, CA, USA: 17th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2011).
- Fumio Machida, Ermeson Andrade, Dong Seong Kim, Kishor S. Trivedi, Candy: Component-based Availability Modeling Framework for Cloud Service Management Using SysML, in Proc. The 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011).
- Ermeson C. Andrade, Fumio Machida, Dong Seong Kim, Kishor S. Trivedi, Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets, Sixth International Conference on Availability, Reliability and Security (ARES 2011).
- Kishor S. Trivedi, Dong Seong Kim, Availability Modeling in Practice, SMRLO 2010. (abstract)
- Ermeson C. Andrade, Fumio Machida, Dong Seong Kim, Kishor S. Trivedi, Modeling and Analyzing Server System with Rejuvenation through SysML and Stochastic Reward Nets, Sixth International Conference on Availability, Reliability and Security (ARES 2011).
Intrusion Detection systems
- I have been working on modeling and improving Intrusion Detection System (IDS) using data-mining, machine learning, and soft computing techniques. I am interested in feature selection and parameter optimization of IDSs, detection of Distributed Denial of Service attacks.
*Selected (related) publications
- Dong Seong Kim, Sang Min Lee, Tae Hwan Kim, Jong Sou Park, Quantitative intrusion intensity assessment for intrusion detection systems, Security and Communication Networks (SCN), 2012
- Sang Min Lee, Dong Seong Kim, Je Hak Lee, Jong Sou Park, Detection of DDoS attacks using optimized traffic matrix, Computers and Mathematics with Applications 63, pp. 501-510, 2012
- Sang Min Lee, Dong Seong Kim, Jong Sou Park, Cost Sensitive Spam Detection Using Parameters Optimization and Feature Selection, Journal of Universal Computer Science, 2011
- Dong Seong Kim and Jong Sou Park, Modeling Network Intrusion Detection System Using Feature Selection and Parameters Optimization, IEICE Trans. Inf&Syst., April, 2008
- Dong Seong Kim, Ha-Nam Nguyen, Jong Sou Park., "Genetic Algorithm to Improve SVM-based Intrusion Detection Systems", Proc. of 19th Int. Conf. on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan. IEEE Computer Society, 2005
- Dong Seong Kim, Julee Lee, Dong Bok Yeom, Sung-Do Chi, and Jong Sou Park, "An Effective SVM Based Intrusion Detection System with Usage of Privileged System Calls", Proc. The Second Int. Conf. on Intelligent Computing and Information Systems (ICICIS 2005), Association for Computing Machinery(ACM), Cairo, Egypt, Mar., 2005
- Dong Seong Kim, Ha-Nam Nguyen, T. Thein, and Jong Sou Park, "An Optimized Intrusion Detection System Using PCA and BNN", Proc. of The 6th Asia-Pacific Sym. on Information and Telecommunication Technologies, IEICE Communications Society, 2005, pp. 356-359
- Jong Sou Park, Hong Tae Jin and Dong Seong Kim, "Intrusion Detection System for Securing Geographical Information System Web Servers", Web & Wireless Geographical Information System (W2GIS 2004), Lecture Notes in Computer Science, Vol. 3428, pp. 110-119, Springer Verlag.
- Dong Seong Kim, Jong Sou Park, "Network-based Intrusion Detection with Support Vector Machines", Preproc. of The Int. Conf. on Information Networking (ICOIN 2003), 732-741, 2003.
Security, Dependability and Survivability for Wireless Sensor Networks/RFID systems
- I have been working on key management, node management, and depenability/security/survivability analysis of wireless sensor networks. I am also interested in RFID security and privacy.
*Selected (related) publications
- Wireless sensor networks.
- Sazia Parvin, Farookh Khadeer Hussain, Jong Sou Park, Dong Seong Kim: A survivability model in wireless sensor networks. Computers & Mathematics with Applications 64(12): 3666-3682 (2012)
- Dong Seong Kim, Rahul Ghosh, Kishor S. Trivedi, A Hierarchical Model for Reliability Analysis of Sensor Networks, Fast Abstract in 15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC2010)
- Sazia Parvin, Dong Seong Kim, Sang Min Lee, and Jong Sou Park, Achieving Availability and Survivability in Wireless Sensor Networks by Software Rejuvenation, In Proc. The 4th Int. Workshop on Security, Privacy, and Trust in Pervasive and Ubiquitous Computing, July, 2008.
- Sazia Parvin, Dong Seong Kim, and Jong Sou Park, Toward Optimal Software Rejuvenation in Wireless Sensor Networks using Self-Regenerative Components, In Proc. The 2nd International Conference on Information Security and Assurance 2008.
- Dong Seong Kim, Muhammad Anwarul Azim, and Jong Sou Park, "Privacy Preserving Support Vector Machines in Wireless Sensor Networks, In Proc. 2008 Third International Conference on Availability, Reliability and Security, pp. 1260-1265, 2008.
- Dong Seong Kim, Sazia Parvin, Jong Sou Park, Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks, In Proc. AINA 2008, IEEE Computer Society.
- Sazia Parvin, Dong Seong Kim, Jong Sou Park, Towards Survivable Sensor Networks using Self-Regenerative Rejuvenation and Reconfiguration, In Proc. The Int. Conf. on Computational Intelligence and Security (CIS 2007), IEEE Computer Society, 2007.
- Jong Sou Park, Dong Seong Kim, Yoon Kyung Suh "Toward Assessing Vulnerability and Risk of Sensor Networks under Node Compromise", Proc. of The Int. Conf. on Computational Intelligence and Security (CIS 2007), IEEE Computer Society, Guangzhou, China, Dec. 15-19, 2007.
- Shuqin Ren, Dong Seong Kim and Jong Sou Park, A Secure Data Aggregation Scheme for Wireless Sensor Networks, Int. Workshop on Security and Survivability in Distributed Sensor Networks, Springer-Verlag Heidelberg, LNCS, 2007.
- Dong Seong Kim, Md. Golam Sadi and Jong Sou Park, A Key Revocation scheme for Mobile Sensor Networks, International Workshop on Security and Survivability in Distributed Sensor Networks, Springer-Verlag Heidelberg, LNCS, Canada, 2007
- Dong Seong Kim, Jung Su Yang and Jong Sou Park, "Adaptation Mechanisms for Survivable Sensor Networks against Denial of Service Attacks", Proc. of the The Second International Conference on Availability, Reliability and Security, ARES 2007, IEEE Computer Society, Vienna University of Technology, Austria, Apr, 2007.
- Mi Sun Moon, Dong Seong Kim and Jong Sou Park, "Toward Modeling Sensor Node Security Using Task-Role Based Access Control with TinySec", Proc. of The Int. Conf. on Computational Intelligence and Security (CIS 2006), IEEE Computer Society, Guangzhou, China, Nov. 3-6, 2006.
- Dong Seong Kim, Khaja Mohammad Shazzad, and Jong Sou Park, "A Framework of Survivability Model for Wireless Sensor Network", Proc. of The First International Conference on Availability, Reliability and Security (ARES 2006), IEEE Computer Society, Vienna University of Technology, Austria, Apr, 2006, pp. 515-522.
- Mohammed Golam Sadi, Dong Seong Kim, Jong Sou Park, "GBR: Grid Based Random Key Predistribution for Wireless Sensor Network", Proc. of The 11th Int. Conf. on Parallel and Distributed Systems (ICPADS 2005), 20-22 July 2005, IEEE Computer Society 2005.
- RFID systems security and privacy.
- Safal Shrestha, Dong Seong Kim, SeulKi Lee, Jong Sou Park, A Peer-to-Peer RFID Resolution Framework for Supply Chain Network, In Proc. 2nd Int. Conf. on Future Networks, 2010.
- Dong Seong Kim and Jong Sou Park, "A Security Framework in RFID Multi-domain System", Proc. of the The Second International Conference on Availability, Reliability and Security, ARES 2007, IEEE Computer Society, Vienna University of Technology, Austria, Apr, 2007.
- Keun-Young Youn, Dong Seong Kim, and Jong Sou Park, A Lightweight RFID Authentication Protocol based on Hash chain, Journal of Information Assurance, Vol. 6, No. 1, Mar, 2006
- Dong Seong Kim, Taek-Hyun Shin, Byunggil Lee and Jong Sou Park, "Access Control and Authorization for Security of RFID Multi-Domain Using SAML and XACML", Wang, Yunping; Cheung, Yiu-ming; Liu, Hailin (Eds.), Revised Selected Papers, Computational Intelligence and Security (CIS 2006), Springer-Verlag Heidelberg, LNCS, 2007
- Do Yun Kim, Dong Seong Kim, and Jong Sou Park, A Study on the Integrated Engine Unit with RFID and Wireless Sensor Network for Low and High Speed Control, Journal of Electronic Information and Telecommunication Engineering, Vol. 12 No. 2. Dec. 2006. (in Korean)
- Dong Seong Kim, Jong Sou Park, Research Components and Future Trends for RFID/USN Security, KIISC review, vol. 5 No. 1, 2005. 2. (in Korean)
Hardware implementation
*Selected (related) publications- Jong Sou Park, Sung-Hwan Kim and Dong Seong Kim, "A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security", Proc. of KES 2006, 10th Int. Conf. Knowledge-Based & Intelligent Information & Engineering Systems, Springer-Verlag, LNCS(LNAI), 2006.
- Sung-Hwan Kim, Dong Seong Kim, Jong Sou Park, Hardware Design and Implementation of Cellular Automata for Lightweight Cryptography, Journal of Electronic Information and Telecommunication Engineering, Vol. 11 No. 1. June 2005.
- Jong Ryul Jin, Dong Seong Kim, Jong Sou Park, A Hardware Design of Hidden Markov Model Based on 3 Stage Pipeline, Journal of Electronic Information and Telecommunication Engineering, Vol. 10 No. 2. Dec. 2004.
- Jong Ryul Jin, Dong Seong Kim, Jong Sou Park, The Hardware Design of the Support Vector Machines, J. of Electronic Information and Telecommunication Engineering, Vol. 10 No. 1. June 2004.
**Research direction**
I would like to work on various types of dependable and secure systems modeling and analysis. I have been working on not only security but also dependability of distributed systems and networks, such as Intrusion Detection Systems, Intelligent Enterprise Security Management system, Security and privacy management of distributed sensor networks, Security and performability management in virtualized data Centers and cloud computing systems, cyber physical systems (e.g., Smart Grid), and Metrics, Model, Analysis for security and survivability. I would like to continue to work on these areas to build secure, reliable, resilient, sustainable, and high available systems and networks.