Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2010-06-18 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Life-cycle Monitoring Method of Malware Download Sites for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14 |
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] |
IA2010-14 ICSS2010-14 pp.75-80 |
ICSS |
2010-03-26 15:30 |
Fukuoka |
The University of Kitakyushu |
Investigation of Attacks to Websites using Multi-domain Web-based Honeypots Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66 |
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] |
ICSS2009-66 pp.25-28 |
NS, IN (Joint) |
2010-03-05 11:40 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A Scheme of Detecting Malware for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2009-200 |
This paper reports the actual situation of malware distributed to websites by constructing web honeypots, which carries ... [more] |
IN2009-200 pp.337-342 |
IN |
2009-07-10 11:25 |
Hokkaido |
HOKKAIDO UNIVERSITY |
A Provider Provisioned Websites Protection Scheme against Malware Distribution Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) IN2009-34 |
This paper proposes a website protection scheme for service providers by analyzing accesses to web honeynets, which carr... [more] |
IN2009-34 pp.55-60 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 13:25 |
Akita |
Akita University |
Investigation about Malware Distribution to Websites Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46 |
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] |
ISEC2009-32 SITE2009-24 ICSS2009-46 pp.175-180 |
IN |
2008-06-20 14:55 |
Hokkaido |
Hokkaido Univ. |
Dynamic Topology Reconfiguration Method for Overlay Networks using Users' Community Information Tomoyasu Ogasa, Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2008-24 |
In an overlay network, it is important to reconfigure its network topology appropriately according to change of traffic ... [more] |
IN2008-24 pp.85-90 |
NS, IN (Joint) |
2008-03-06 11:50 |
Okinawa |
Bankoku Shinryokan |
Identification Method of Attacking Source Using Traffic Flow in Backbone Networks Takeshi Kuwahara, Tsuyoshi Kondoh, Takeshi Yagi, Keisuke Ishibashi, Junichi Murayama (NTT) IN2007-169 |
In this paper, we propose a novel identification method of attacking source using traffic flow information in backbone n... [more] |
IN2007-169 pp.61-66 |
MoNA, IN (Joint) |
2007-11-15 14:55 |
Fukuoka |
Fukuoka Institute of Technology |
NMF: Network Mining Framework using Topological Structure of Complex Networks Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2007-90 |
In this paper, we propose a network mining framework called NMF that supports integration of several link mining methods... [more] |
IN2007-90 pp.7-12 |
MoNA, IN (Joint) |
2007-11-15 15:20 |
Fukuoka |
Fukuoka Institute of Technology |
On Application Concentrator for Supporting Application-Level Multiple Association Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2007-91 |
In this paper, we propose a concept of application concentrator that realizes the multiple association at an application... [more] |
IN2007-91 pp.13-18 |
NS, CS, IN (Joint) |
2007-09-21 09:50 |
Miyagi |
Tohoku University |
A Practical Feasibility Study of a Network Control Method for Sharing DDoS-Attack Mitigation Devices Takeshi Yagi, Takeshi Kuwahara, Junichi Murayama (NTT) IN2007-60 |
This paper reports results of feasibility study about dynamic traffic control methods to re-route traffic into DDoS-atta... [more] |
IN2007-60 pp.99-104 |
NS, CS, IN (Joint) |
2007-09-21 10:10 |
Miyagi |
Tohoku University |
A Proposal of Detection Method for Application Anomaly Traffic over Large-scale Backbone Networks Takeshi Kuwahara, Takeshi Yagi, Atsushi Kobayashi, Keisuke Ishibashi, Junichi Murayama (NTT) IN2007-61 |
This paper proposes a novel anomaly detection method for application traffic over large-scale backbone networks. The pro... [more] |
IN2007-61 pp.105-110 |
IN |
2007-07-20 11:00 |
Hyogo |
Kobe University |
On Network Architecture for Realizing Group-Oriented Communication Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Junichi Murayama (NTT) IN2007-35 |
In this paper, we propose a novel communication paradigm called group-oriented communication. Different
from convention... [more] |
IN2007-35 pp.49-54 |
IN |
2007-07-20 11:25 |
Hyogo |
Kobe University |
A Practical Feasibility Test of SPX:Secure networking Platform for group-oriented eXchange Takeshi Yagi, Junichi Murayama, Katsuyasu Toyama (NTT), Yousuke Takahashi, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.) IN2007-36 |
This paper reports results of development and feasibility study about SPX (Secure networking Platform for group-oriented... [more] |
IN2007-36 pp.55-60 |
RCS, IN (Joint) |
2007-05-17 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Toward Group-Oriented Communication: Comparative Study of Modern Network Architectures Yousuke Takahashi, Kouhei Sugiyama, Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.), Takeshi Yagi, Kunio Hato, Junichi Murayama (NTT) IN2007-2 |
In this paper, we disscuss a network architecture realizing group-oriented communication for solving the problem
in the... [more] |
IN2007-2 pp.7-12 |
NS, IN (Joint) |
2007-03-08 10:50 |
Okinawa |
Okinawa Convention Center |
A Load Balancing Method between Distributed DDoS-Attack Mitigation Systems by dividing anomaly traffic Takeshi Yagi, Kazuhiro Okura, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT) IN2006-200 |
This paper proposes a large-volume DDoS-attack defense method which scrubs anomaly traffic with a DDoS-attack mitigatio... [more] |
IN2006-200 pp.119-124 |
IN |
2007-02-02 11:15 |
Aichi |
Aichi Prefectural University |
Architecture Design of SPX : Secure networking Platform for group-oriented eXchange Takeshi Yagi, Kunio Hato, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT), Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.) IN2006-173 |
This paper discusses some security problems in the Internet, such as spam and phishing, and proposes the community commu... [more] |
IN2006-173 pp.65-70 |
ICM, IN, LOIS (Joint) |
2007-01-19 10:40 |
Oita |
Beppu Convention Center(B-Con Plaza) |
A Communication Control Method using Personal Information for Secure SNS Takeshi Yagi, Kunio Hato, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT), Hiroyuki Ohsaki, Makoto Imase (Osaka Univ.) IN2006-155 |
This paper proposes communication control method to enhance security of social networking services. This method is compo... [more] |
IN2006-155 pp.103-108 |
IN |
2006-12-15 14:00 |
Osaka |
|
Evaluations of a Network Control Scheme for Sharing DDoS Attack Mitigation System called as Scrubingbox Takeshi Yagi, Kazuhiro Okura, Masao Tanabe, Junichi Murayama, Katsuyasu Toyama (NTT) IN2006-131 |
This paper evaluates dynamic traffic control methods to re-route traffic into DDoS-attack mitigation devices, namely Scr... [more] |
IN2006-131 pp.103-108 |
IN |
2006-02-16 13:25 |
Kochi |
Kochi Univ. of Technology |
A Distributed Traffic-Monitoring Scheme for Overlay Networks Takeshi Yagi, Yuuichi Naruse, Junichi Murayama, Kazuhiro Matsuda (NTT) |
[more] |
IN2005-144 pp.7-12 |
NS, IN |
2005-03-04 11:10 |
Okinawa |
Okinawa Zanpa-misaki Royal |
Demand-base Cut-through Optical Path Control Scheme for Terabit-class Super-network Takeshi Yagi, Kenichi Matsui, Yuuichi Naruse, Junichi Murayama, Kazuhiro Matsuda (NTT) |
This paper proposes a demand-based cut-through optical path control scheme. This scheme is effective for terabit-class s... [more] |
NS2004-286 IN2004-286 pp.211-216 |