Skip to main content

Showing 1–6 of 6 results for author: Yoo, J D

.
  1. arXiv:2311.14496  [pdf, other

    cs.CR

    RTPS Attack Dataset Description

    Authors: Dong Young Kim, Dongsung Kim, Yuchan Song, Gang Min Kim, Min Geun Song, Jeong Do Yoo, Huy Kang Kim

    Abstract: This paper explains all about our RTPS datasets. We collect malicious/benign packet data by injecting attack data in an Unmanned Ground Vehicle (UGV) in the normal state. We assembled the testbed, consisting of UGV, Controller, PC, and Router. We collect this dataset in the UGV part of our testbed. We conducted two types of attack "Command Injection" and "Command Injection with ARP Spoofing" on… ▽ More

    Submitted 2 April, 2024; v1 submitted 24 November, 2023; originally announced November 2023.

    Comments: This manuscript is written in Korean. You can download our dataset through our lab: https://ocslab.hksecurity.net/Datasets/rtps-attack-dataset We welcome your comments or feedback. Contact INFO: Dong Young Kim ([email protected]), Huy Kang Kim ([email protected])

  2. arXiv:2311.14342  [pdf, other

    cs.CR

    AI-based Attack Graph Generation

    Authors: Sangbeom Park, Jaesung Lee, Jeong Do Yoo, Min Geun Song, Hyosun Lee, Jaewoong Choi, Chaeyeon Sagong, Huy Kang Kim

    Abstract: With the advancement of IoT technology, many electronic devices are interconnected through networks, communicating with each other and performing specific roles. However, as numerous devices join networks, the threat of cyberattacks also escalates. Preventing and detecting cyber threats are crucial, and one method of preventing such threats involves using attack graphs. Attack graphs are widely us… ▽ More

    Submitted 27 November, 2023; v1 submitted 24 November, 2023; originally announced November 2023.

    Comments: in Korean Language, 8 Figures, 14 Pages

  3. arXiv:2311.14327  [pdf, other

    cs.CR

    C-ITS Environment Modeling and Attack Modeling

    Authors: Jaewoong Choi, Min Geun Song, Hyosun Lee, Chaeyeon Sagong, Sangbeom Park, Jaesung Lee, Jeong Do Yoo, Huy Kang Kim

    Abstract: As technology advances, cities are evolving into smart cities, with the ability to process large amounts of data and the increasing complexity and diversification of various elements within urban areas. Among the core systems of a smart city is the Cooperative-Intelligent Transport Systems (C-ITS). C-ITS is a system where vehicles provide real-time information to drivers about surrounding traffic… ▽ More

    Submitted 27 November, 2023; v1 submitted 24 November, 2023; originally announced November 2023.

    Comments: in Korean Language, 14 Figures, 15 Pages

  4. arXiv:2212.10854  [pdf, other

    cs.CR

    Defining C-ITS Environment and Attack Scenarios

    Authors: Yongsik Kim, Jae Woong Choi, Hyo Sun Lee, Jeong Do Yoo, Haerin Kim, Junho Jang, Kibeom Park, Huy Kang Kim

    Abstract: As technology advances, it is possible to process a lot of data, and as various elements in the city become diverse and complex, cities are becoming smart cities. One of the core systems of smart cities is Cooperative-Intelligent Transport Systems (C-ITS). C-ITS is a system that provides drivers with real-time accident risk information such as surrounding traffic conditions, sudden stops, and fall… ▽ More

    Submitted 21 December, 2022; originally announced December 2022.

    Comments: in Korean language

  5. arXiv:2212.09268  [pdf, other

    cs.CR

    UAVCAN Dataset Description

    Authors: Dongsung Kim, Yuchan Song, Soonhyeon Kwon, Haerin Kim, Jeong Do Yoo, Huy Kang Kim

    Abstract: We collected attack data from unmanned vehicles using the UAVCAN protocol, and public and described technical documents. A testbed was built with a drone using PX4, and a total of three attacks, Flooding, Fuzzy, and Replay, were performed. The attack was carried out in a total of 10 scenarios. We expect that the attack data will help develop technologies such as anomaly detection to solve the secu… ▽ More

    Submitted 8 April, 2024; v1 submitted 19 December, 2022; originally announced December 2022.

    Comments: in english language

  6. arXiv:2204.06113  [pdf, other

    cs.CR

    Liuer Mihou: A Practical Framework for Generating and Evaluating Grey-box Adversarial Attacks against NIDS

    Authors: Ke He, Dan Dongseong Kim, **g Sun, Jeong Do Yoo, Young Hun Lee, Huy Kang Kim

    Abstract: Due to its high expressiveness and speed, Deep Learning (DL) has become an increasingly popular choice as the detection algorithm for Network-based Intrusion Detection Systems (NIDSes). Unfortunately, DL algorithms are vulnerable to adversarial examples that inject imperceptible modifications to the input and cause the DL algorithm to misclassify the input. Existing adversarial attacks in the NIDS… ▽ More

    Submitted 12 April, 2022; originally announced April 2022.

    Comments: 16 pages, 8 figures, planning on submitting to ACM CCS 2022

    ACM Class: I.2.1