H.I.T. Laboratory was established in 2004 and is an abbreviation of Hackers In inTrusion. Our laboratory conducts research on a broad area of theory and applications related to network security and privacy. We also propose solutions on the attack and defense of misbehavior in the network. We also perform research on many protocols and application security.
Our research interests span several areas of computer network security including
- Mobile Communications Security
- Emerging Wireless Application Security
- Smartphones Security
- The Internet Security
The detailed information on our research area is described in Projects.
Why Network Security?
Computer infrastructures today are implemented in a networked environment; where it is susceptible to attacks. There is a need for a secure solution to prevent unauthorized access, privilege escalation, or invasion of privacy in the services and systems. Network security is a broadly recognized field. It’s getting the spotlight as the industry is leaning towards a total security solution.
Security protocols, systems such as intrusion detection systems (IDS), and algorithms related to security applications are being researched in security field. We try to understand the network security communications systems as a whole and deal with the issues from the ground up. We try to provide sound solutions for solving the problems which is a threat to the network security system. Network security is like a vicious cycle of patch work after patch work after a breach in security. We need to proactively protect the network and react accordingly before a violation actually occurs.
For this purpose, we conduct research on existing security protocols and check the network status by closely monitoring the Intrusion Detection/Prevent System or Network Monitoring System. We also need to increase our knowledge basis regarding Internet Traffic Characterization.
Network Security : 5G and beyond
- Tactile Internet
- Fog Computing
- Named Data Networking (NDN)
- Internet of Things (IoT)
Network Security : Mobility Management
- Distributed and Network-based
System Hacking : Reverse Engineering
- Microsoft Windows Series
- Mobile OS (Android, iOS, Tizen)
- Embedded System
- Wearable Device (Gear, Sportband)