Journal

    • T. Park, K. Kang, and D. Moon, "A Scalable and Seamless Connection Migration Scheme for Moving Target Defense in Legacy Networks," IEICE Trans. on Information and Systems, Vol.E101-D, No.11, pp.2706-2709, Nov. 2018.
    • K. Kang and J. Kim, "A Case Study on Converged Security with Event Correlation of Physical and Information Security," International Journal of Security and Its Applications, vol.9, no.9, pp.77-94, Sept. 2015.
    • K. Kang, "Performance Anomaly of the IEEE 802.11 DCF in Different Frame Error Rate Conditions," Journal of Information Processing Systems, vol.8, no.4, pp.739-748, nov. 2012.
    • I. Kim, D. Kim, Y. Choi, K. Kang, J. Oh, and K. Han, "Validation Methods of Suspicious Network Flows for Unknown Attack Detection," International Journal of Computers, Issue 1, Vol.3, pp. 104-114, Jan. 2009.
    • I. Kim, K. Kang, Y. Choi, D. Kim, J. Oh, and K. Han, "Executable code recognition in network flows using instruction transition probabilities," IEICE Trans. on Information and Systems Vol.E91-D, No.7, pp. 2076-2078, July 2008.
    • K. Kang and B. Steyaert, "Bound analysis for WRR scheduling in a statistical multiplexer with bursty sources," Telecommunication Systems, Vol. 12, Nos. 2-3, pp.123-147, Nov. 1999.
    • Koohong Kang and Cheeha Kim, "Performance Analysis of Statistical Multiplexing of Heterogeneous Discrete-time Markovian Arrival Processes in an ATM Network," Computer Communications, Vol. 20, No. 11 pp.970-978, Oct. 1997.
    • Koohong Kang, Bart Steyaert and Cheeha Kim, "A Simple Relation Between Loss Performance and Buffer Contents in a Statistical Multiplexer with Periodic Vacations," IEICE Trans. on Communi., Vol. E80-B, No. 11, pp. 1749-1752, Nov. 1997.

    Journal (Korean)

    • K. Kang, "An Experimental Study on AutoEncoder to Detect Botnet Traffic using NetFlow-Timewindow Scheme: Revisited," Journal of The Korea Institute of Information Security and Cryptology, Vol. 33, No. 4, Aug. 2023.
    • K. Kang, "A Deep Learning Approach with Stacking Architecture to Identify Botnet Traffic," Journal of The Korea Society of Computer and Information, Vol. 26, No. 12, pp.123-132, Dec. 2021.
    • K. Kang, "Network Anomaly Detection Technologies Using Unsupervised Learning AutoEncoders," Journal of The Korea Institute of Information Security and Cryptology, Vol.30, No.4, pp.617-629, Aug. 2020.
    • K. Kang, "Decision Tree Techniques with Feature Reduction for Network Anomaly Detection," Journal of The Korea Institute of Information Security and Cryptology, Vol.29, No.4, pp.795-805, Aug. 2019.
    • K. Kang, T. Park, and D. Moon, "Analysis of Threat Model and Requirements in Netowrk-based Moving Target Defense," Journal of The Korea Society of Computer and Information, Vol. 22, No. 10, pp.83-92, Oct. 2017.
    • K. Kang, "Detecting the HTTP-GET Flood Attacks Based on the Access Behavior of Inline Objects in a Web-page Using NetFlow Data," Journal of The Korea Society of Computer and Information, Vol. 21, No. 7, pp.1-8, July 2016.
    • K. Kang, "A Brute-force Technique for the Stepping Stone Self-Diagnosis of Interactive Services on Linux Servers," Journal of The Korea Society of Computer and Information, Vol. 20, No. 5, pp.41-51, May 2015.
    • K. Kang, "An Implementation Strategy for the Physical Security Threat Meter Using Information Technology," Journal of The Korea Society of Computer and Information, Vol. 19, No. 7, pp.47-57, July 2014.
    • K. Kang, D. Kang, J. Na, and I. Kim, "Utilization of Physical Security Events for the Converged Security using Analytic Hierarchy Process: focus on Information Security," Journal of The Korea Institute of Information Security and Cryptology, Vol. 22, No. 3, pp.553-564, June 2012.
    • K. Kang, "Throughput Analysis of the IEEE 802.11g DCF with ERP-OFDM Parameters," Journal of the Korea Industrial Information Systems Research, Vol. 16, No. 2, pp. 1-11, June 2011.
    • K. Kang, H. Lee, K. Kim, J. Oh, and J. Jang, "Detection of the Portent of Distributed DoS Attacks on the Internet AS-level Topology," Journal of KIISE: Information Networking, Vol. 37, No. 5, pp. 339-341, Oct. 2010.
    • K. Kang, "Power-Laws Exponents of the Domestic AS-level Internet Topology based on the Valley-free BGP Routing Policy," Journal of The Korean Society for Internet Information , Vol. 11, No. 4, pp. 41-49, Aug. 2010.
    • K. Kang, "Protective Mechanism for Sensitive Data Using Lightweight Process Tracking," Journal of The Korea Contents Association , Vol. 9, No. 5, pp. 33-39, May 2009.
    • K. Kang, "Simulation for the Propagation Pattern Analysis of Code Red Worm," Journal of The Korea Contents Association , Vol. 6, No. 12, pp. 155-162, December 2006.
    • K. Kang, J. Oh and J. Kang, "Anomaly Detection Method Using Entropy of Network Traffic Distributions," Journal of KIPS , Vol. 13-C, No. 3, pp. 283-294, June 2006.
    • K. Kang and H. Hwang, "Implementation of an ASP Upload Component to Comply with RFC 1867," Journal of The Korea Contents Association (KOCON) , Vol. 6, No. 3, pp. 63-74, March 2006.
    • K. Kang, "Performance Analysis of a WCSFQ(Weighted Core-Stateless Fair Queueing)-like Space Priority Policy for ATM nodes," Journal of KIPS , Vol. 12, No. 5, pp. 687-694, Oct. 2005.
    • K. Kang, J. Jang and K. Kim, "A Real-Time Network Anomaly Detection Scheme Using NetFlow Data," Journal of KIPS , Vol. 12, No. 1, pp. 363-374, Feb. 2005.
    • K. Kang, I. Kim and J. Jang, "A Network Processor-based In-Line Mode Intrusion Detection System for High-Speed Networks," Journal of KIISE : Information Networking , Vol. 31, No. 4, pp. 363-374, Aug. 2004.
    • S. Park, K. Kang and K. Han, "Proposal of Optical CDMA Routing Scheme for Radio Access Network," Journal of KIPS(Korea Information Processing Society), Vol. 9-C, No. 4, pp. 581-588, Aug. 2002.
    • K. Kang and S. Park, "A Practical Connection Admission Control Scheme in ATM Networks," Journal of KIISE : Information Networking , Vol. 29, No. 2, pp. 181-187, April 2002.
    • S. Park and K. Kang, "Performance Analysis of Optical Line Termination System in ATM based Passive Optical Network," Journal of KIISE : Information Networking , Vol. 29, No. 1, pp. 40-47, Feb. 2002.
    • K. Kang and S. Park, "A Rate-Controlled Cell Multiplexer in ATM Networks," Journal of KIISE : Information Networking , Vol. 28, No. 3, pp. 417-425, Sept. 2001.
    • Koohong Kang and Cheeha Kim, "ATM Connection Admission Control Scheme Using Multilayer Perceptron," Journal of KIISE: Information Networking , Vol. 23, No. 12, pp. 1225-1237, 1996.
    • Koohong Kang, Yongseok Yoon, and Cheeha Kim, "A Connection Admission Control Scheme for heterogeneous Traffic in ATM Networks," Journal of KIISE: Information Networking, Vol. 23, No. 6, pp. 609-622, 1996.
    • K. Kang, D. Kim and J. Baek, "A Study on the Performance Comparison of Line Codes for ISDN U-Interface," Journal of KIEE , Vol. 27, No. 5, May 1990.

    Conference (including LNCS)

    • J. Kim, J. Kim, I. Kim, and K. Kang, "NetFlow Based HTTP Get Flooding Attack Analysis," Proc. SECURWARE 2017, The Eleventh International Conference on Emerging Security Information, Systems and Technologies , Rome, Italy, Sept. 2017.
    • K. Kang, J. Kim, and I. Kim, "Stepping Stone Detection under Timing Perturbations through the Uniform Distributed Random Delay," Proc. INTERNET 2016 , Barcelona, Spain, Nov. 2016.
    • K. Kang, J. Kim, J. Kim, S. Lee, and I. Kim "Detection of an Interactive-Service Connection Chain for Tracing Intruders using NetFlow Data," Proc. ICONI 2015 , Kuala Lumpur, Malaysia, Dec. 2015.
    • J. Kim, I. Kim and K. Kang, "Implementation of Netflow based Interactive Connection Tracback System," Proc. ICSNC 2015 , Barcelona, Spain, Nov. 2015. (Best Paper Award)
    • Y. Cho, K. Kang, I. Kim and K. Jeong, "Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points," LNCS 5787 pp. 385-397, 2009, and Proc. APNOMS 2009 , Jeju, Korea, Sept. 2009.
    • I. Kim, K. Kang, Y. Choi, D. Kim, J. Oh, and K. Han, "A Practical Approach for Detecting Executable Codes in Network Traffic," LNCS 4773 pp. 354-363, 2007, and Proc. APNOMS 2007 , Sapporo, Japan, Oct. 2007.
    • K. Kang, "Anomaly detection of hostile traffic based on network traffic distribution," LNCS 5200 pp. 781-790, 2008, and Proc. ICOIN 2007 , Estoril, Portugal, Jan. 2007.
    • J. Kim, K. Kang, I. Kim, K. Kim, J. Jang and S. Sohn, "Practical Network Attack Situation Analysis Using Sliding Window Cache Scheme," 9th Asia Pacific Conference on Communications (APCC2003) in conjunction with 6th Malaysia Internation Conference on Communications (MICC) , Penang, Malaysia, Sept. 2003.
    • J. Kim, K. Kang, I. Kim, K. Kim, J. Jang and S. Sohn, "An Integrated Network-wide Defence Framework (INwDF) for Large Networks," SAM'03(The 2003 International Conference on Security and Management , Las Vegas, Nevada, pp. 20-26, June 2003.
    • I. Kim, K. Kang, J. Kim, J. Jang and S. Sohn, "A Layer 2 Adaptation Scheme for Metro Ethernet Service over Legacy ATM Networks," ICAT2003(The 5th International Conference on Advanced Communication Technology , Pheonix Park, Korea, pp. 401-405, Jan. 2003.
    • I. Kim, K. Kang, Z. Kim, J. Jang and Y. Baek, "A simple rate-based congestion control scheme using an enhanced BECN in ATM networks," LNCS 2343 , pp. 17-27, and Proc. ICOIN-16(The 16th International Conference on Information Networks , Jeju, Korea, pp. 4D-2.1-4D-2.11, Jan. 2002.
    • K. Kang, B. Steyaert and C. Kim, "Service separation in ATM networks using a hardware efficient rate-controlled cell multiplexer," ITC 16 , Edingurgh, United Kingdom, pp. 395-404, June. 1999.
    • B. Steyaert, K. Kang and H. Bruneel, "Performance of a Round-Robin bandwidth allocation scheme," Proceedings of the COST 257 Fifth Management Committee Meeting, Rome, COST257TD(98)22, Jan. 1998.
    • Koohong Kang, Bart Steyaert and Cheeha Kim, "An approximation for the buffer behaviour of a statistical multiplexer with contiguous assignments and deterministic vacations," ICCC'97 , Cannes, France, pp. 407-412, Nov. 1997.
    • Bart Steyaert, Koohong Kang and Cheeha Kim, "Analysis of the cell delay under a weighted round-robin bandwidth allocation scheme," Second IFIP workshop , Montreal, Canada, Sept. 1997.
    • Koohong Kang, Yongseok Yoon and Cheeha Kim, "A REACTIVE CONGESTION CONTROL SCHEME FOR ATM NETWORKS," The International Association of and Technology for Development (IASTED), Orlando, Florida, pp. 117-120, Jan. 1996.
    • Koohong Kang, Yongseok Yoon and Cheeha Kim, "A CAC SCHEME FOR HETEROGENEOUS TRAFFIC IN ATM NETWORKS TO SUPPORT MULTIPLE QoS REQUIREMENTS," GLOBECOM'95 , Singapore, pp. 422-426, Nov. 1995.
    • Koohong Kang and Cheeha Kim, "Practical Connection Admission Control Scheme in ATM Networks," ICOIN-9 Osaka, Japan, pp. 207-212, Dec. 1994.

    Book (Korean)

    • K. Kang, Essence of Computer Networking, ISBN 89-91565-01-8, Seowon University Press, 2005. 2. 1
    • H. Song and K. Kang, Microprocessor AT89C51 LAB Book, ISBN 89-91565-14-X, Seowon University Press, 2005. 2. 1

    Patent

    • K. Kang et al., "Apparatus and Method of Detecting Distributed Refelection Denial of Service Attack Based on Flow Information," US patent # US 2017/0257386 A1, Pub. Date: Sep. 7, 2017, Patent Registration No. 10447715, Oct. 15, 2019.
    • K. Kang et al., "System and Method for Connection Fingerprint Generation and Stepping-Stone Traceback based on NetFlow," US patent # US 2017/0134413 A1, May 11, 2017, Patent Registration No. 10264004, May 16 2019
    • K. Kang et al., "Method for Connection Fingerprint Generation and Traceback based on NetFlow," patent pending #2016-0052154(KOREA), 15/345354(USA), 2016-216342(JAPAN), 201610987131.2(CHINA), 2016.04-28
    • K. Kang et al., "Apparatus and Method of Detecting the Distributed Reflection Denial of Service Attack based on the Flow Information," patent pending #2016-0025182(KOREA), 2016.04-28
    • K. Kang, "Device and method for detecting sensitive data leakage in portable terminal," patent #10-2009-00685320. 2009. 06. 29
    • K. Kang, "Automatic Parking Management System with Illumination Sensor and Method by the same," patent #10-0923155, 2009. 10. 15
    • K. Kang, "An Apparatus for Displaying of Humidity Conditions in the Flowerpot," patent pending #20-2007-0005563, 2007. 4. 5
    • K. Kang, "Method and System for the Voice Service with a Mobile Handset on Exhibition," patent pending #10-2006-0039380, 2006. 5. 2
    • K. Kang, "A Method for the Detection of Network Anomalies by the Entropy of Destination Network Distributions," patent #10-0725179, 2007. 5. 29
    • K. Kang, "A Method for the Detection of Network Anomalies Using NetFlow data," patent pending #10-2005-0016311, 2005. 3. 15
    • K. Kang et al., "An In-line mode network intrusion detection system by using Agere network processors and method therefore," patent US 7,401,145 B2, 2008. 7. 15
    • K. Kang et al., "In-line mode network intrusion detection/prevention system and method therefor," patent #10-0558658, 2006. 3. 2
    • K. Kang et al. , "A layer 2 interworking unit for metro ethernet service by using the deployed ATM networks and method therefor," patent #10-0545679, 2006.1.17
    • K. Kang et al. , "Time Switch," patent #54167
    • K. Kang et al. , "Test, Operation, and Management Equipment for Time Switch of Digital Switching System," patent #57482
    • K. Kang et al. , "Data Link Interface Equipment," patent #57484
    • K. Kang et al. , "Control Memeory Equipment of Time Switch," patent #54168
    • K. Kang et al. , "Speech Memeory Equipment of Time Switch," patent #54169
    • K. Kang et al. , "Multiplexer/Demultiplexer Equipment," patent #57483
    • K. Kang et al. , "Time Switch Equipment," patent #57486
    • K. Kang et al. , "Duplicated Time Switch Equipment of Digital Switching System," patent #57485
    • K. Kang et al. , "Link Path Test Method of Digital Switching System," patent #55111
    • K. Kang et al. , "Speech Path Test Method of Digital Switching System," patent #57487
    • K. Kang et al. , "2K time slots Time Switch," patent #68835
    • K. Kang et al. , "Time Switch with Inter-call Connection," patent #68847
    • K. Kang et al. , "Both-way 1K Time Slot Exchange Circuit," patent #72458
    • K. Kang et al. , "Circuit for Control Memory and Operation and Management," patent #72457
    • K. Kang et al. , "Circuit for Byte-wised CRC Calculation of the ATM Cell Head," patent #79728
    • K. Kang et al. , "Circuit for the Generation of High-resolution Single Pulse By Manual Reset Switch," patent #77400
    • K. Kang et al. , "Circuit Debuging Extension Card with Multiple Power Inputs," patent #77377
    • K. Kang et al. , "CRC capable of Block Deliniation," patent #91688
    • K. Kang et al. , "ATM Switch using Asymetric Limited Shared Memory," patent #104681
    • K. Kang et al. , "Space Priority Control in ATM Networks," patent #175735
    • K. Kang et al. , "Connection Admission Control for Heterogeneous Traffic Sources Using Upper-bound Cell Loss Probability," patent #209352
    • K. Kang et al. , "An apparatus for cell flow control and an ATM switching system using it," patent #10-0333638