scispace - formally typeset
M

Min Suk Kang

Researcher at National University of Singapore

Publications -  51
Citations -  948

Min Suk Kang is an academic researcher from National University of Singapore. The author has contributed to research in topics: Denial-of-service attack & Base station. The author has an hindex of 14, co-authored 48 publications receiving 790 citations. Previous affiliations of Min Suk Kang include KAIST & Carnegie Mellon University.

Papers
More filters
Proceedings ArticleDOI

The Crossfire Attack

TL;DR: The Crossfire attack -- a powerful attack that degrades and often cuts off network connections to a variety of selected server targets (e.g., servers of an enterprise, a city, a state, or a small country) by flooding only a few network links.
Proceedings ArticleDOI

CoDef: collaborative defense against large-scale link-flooding attacks

TL;DR: A collaborative defense mechanism, called CoDef, is presented, which enables routers to distinguish low-rate attack flows from legitimate flows, and protect legitimate traffic during botnet attacks.
Proceedings ArticleDOI

Adaptive Interference-Aware Multi-Channel Clustering Algorithm in a ZigBee Network in the Presence of WLAN Interference

TL;DR: An adaptive interference-aware clustering algorithm using multiple channels in a WPAN in the presence of WLAN interference is proposed that is effective in an IEEE 802.15.4 cluster-tree network to avoid interference from WLANs.
Proceedings ArticleDOI

SPIFFY: Inducing Cost-Detectability Tradeoffs for Persistent Link-Flooding Attacks.

TL;DR: A software-defined network (SDN) based system called SPIFFY is designed that addresses key practical challenges in turning this high-level idea into a concrete defense mechanism, and provides a practical solution to force a tradeoff between cost vs. detectability for linkflooding attacks.
Proceedings ArticleDOI

A Stealthier Partitioning Attack against Bitcoin Peer-to-Peer Network

TL;DR: The EREBUS attack as discussed by the authors makes the adversary AS a natural man-in-the-middle network of all the peer connections of one or more targeted Bitcoin nodes by patiently influencing the targeted nodes' peering decision.