Professor Hyuk Lim researches active cyber security based on artificial intelligence with the US Army Research Lab
□ Professor Hyuk Lim of the School of Electrical Engineering and Computer Science at the Gwangju Institute of Science and Technology (GIST, President Seung Hyeon Moon) and his colleagues are collaborating with the US Army Research Laboratory (ARL) and the US Army International Technology Center-Pacific (ITC- PAC) to strengthen cyber security and to jointly develop Moving Target Defense (MTD) software, a future security technology that can actively respond to cyber attacks.
* Active and intelligent cyber security technology that can prevent the attacker from analyzing and exploiting vulnerabilities in a system by dynamically changing and diversifying the IP / MAC address, port, routing path, etc.
∘ The White House announced in 2011 that the MTD technology as one of its cyber security development strategies. Gartner, a world-leading IT research firm, selected Deception technology as a remarkable security technology in 2016, which hinders enemy cyber attacks and slows attacks, predicting that more than 10% of companies will use Deception software to protect their internal systems.
□ Recently, intelligent and sophisticated cyber attacks have caused frequent incidents in which governmental organizations and enterprise systems are paralyzed or large amounts of personal information is leaked.
∘ To safeguard the major social infrastructures such as information systems and power grid connected to the network from diversified and intelligent cyber attacks, it is necessary to use not only the existing passive security methods that detect when an attack occurs, such as an intrusion detection system (IDS), but the application of intelligent and active cyber security software technology utilizing artificial intelligence and software defined network technology is essential.
□ The team plans to detect vulnerabilities of information systems and analyze them through artificial intelligence before developing active MTD security software technology to deceive and hinder attackers.
∘ Therefore, it is expected to play a major role in preventing and responding to various malicious cyber attacks, including advanced persistent threat (APT) attack * which is currently causing a lot of damage.
* Attack method that uses malicious computer software to stealthily and continuously monitor specific targets and obtain information.
□ Professor Hyuk Lim said, "In contrast to the existing method of using a rule-based passive security system and static network security equipment, intelligent detection using artificial intelligence technology and active coping technology using software defined network technology are indispensable. The MTD network security technology to be developed in the future will perform vulnerability analysis of the attack behavior and can contribute greatly to safeguarding the networked information system."
□ This research is a research on cyber security technology that is based on artificial intelligence and software defined network * technologies and is sponsored by GIST and supported by the US Army ARL / ITC-PAC. The research is being carried out with the support of the core technology for the development of information protection (cyber security defense circulation technology to cope with new security threats) supported by the Ministry of Information, Communication and the Ministry of Information and Communication Technology Promotion.
* A new networking paradigm that controls and manages the delivery of data traffic over the network in a centralized manner through software-based protocols.