Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2018-03-07 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A study of security requirements and function implementation for home networks in a period of IoT expansion Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT) ICSS2017-59 |
We discuss the security requirements in the home networks in a period of IoT expansion. Based on the security requiremen... [more] |
ICSS2017-59 pp.49-54 |
NS, IN (Joint) |
2017-03-03 10:40 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
A Proposal of Applying TPM Based Authentication on IoT Devices Access Control Techniques. Tsuyoshi Kondoh, Masami Ueno (NTT) IN2016-134 |
Along with rapid increase of IoT (Internet of Things), the threat increases. For example some IoT device are function po... [more] |
IN2016-134 pp.223-226 |
IN, ICTSSL, NWS (Joint) |
2016-10-20 13:30 |
Osaka |
Osaka Uinv. |
A Study of Requirements on Authentication and Traffic Control for IoT Devices Tsuyoshi Kondoh, Shingo Kashima, Masami Ueno (NTT) IN2016-51 |
Along with rapid increase of IoT (Internet of Things) devices, low-security devices will increase. In this paper we cons... [more] |
IN2016-51 pp.15-18 |
IN |
2013-06-21 10:25 |
Fukui |
University of Fukui, Bunkyo Campus, Memorial Academy Hall |
Reduction of VM Lead Time in Massive Scale Out Tsuyoshi Kondoh, Yuichi Sudo, Kunio Hato (NTT) IN2013-30 |
Cloud computing offers on demand and pay-per-use type of services, in which users can utilize virtual machines only when... [more] |
IN2013-30 pp.29-32 |
IA |
2012-10-18 16:00 |
Overseas |
Phuket |
Identifying Anomalous Traffic using Dynamic Programing based Differential Analysis Method Keisuke Ishibashi, Tsuyoshi Kondoh (NTT) IA2012-38 |
[more] |
IA2012-38 pp.25-29 |
IA |
2010-10-29 10:40 |
Overseas |
Bangkok, Thailand (T.B.D) |
Effect of temporal monitoring granularity on detection accuracy of anomalous traffic Keisuke Ishibashi, Ryoichi Kawahara, Tatsuya Mori, Tsuyoshi Kondoh (NTT), Shoichiro Asano (NII) IA2010-49 |
[more] |
IA2010-49 pp.43-48 |
NS |
2008-05-15 15:00 |
Hokkaido |
Future University-Hakodate |
Evaluation for Detectability of Identifying the Anomalous Traffic Using Delta Traffic Shigeaki Harada, Ryoichi Kawahara, Noriaki Kamiyama, Tsuyoshi Kondoh, Keisuke Ishibashi (NTT), Shoichiro Asano (NII) NS2008-1 |
To mitigate the anomalous traffic such as DDoS attacks,
it is necessary to accurately identify the anomalous traffic so... [more] |
NS2008-1 pp.1-6 |
NS, IN (Joint) |
2008-03-06 11:50 |
Okinawa |
Bankoku Shinryokan |
Identification Method of Attacking Source Using Traffic Flow in Backbone Networks Takeshi Kuwahara, Tsuyoshi Kondoh, Takeshi Yagi, Keisuke Ishibashi, Junichi Murayama (NTT) IN2007-169 |
In this paper, we propose a novel identification method of attacking source using traffic flow information in backbone n... [more] |
IN2007-169 pp.61-66 |
NS, CS, IN (Joint) |
2007-09-21 10:30 |
Miyagi |
Tohoku University |
Identifying the Anomalous Traffic Using Delta Traffic Tsuyoshi Kondoh, Keisuke Ishibashi (NTT) IN2007-62 |
This paper reports a technique of identifying the anomalous traffic and its evaluation result. Our identification techni... [more] |
IN2007-62 pp.111-116 |
ICM |
2007-05-11 09:15 |
Kochi |
Kochi Uni. of Technology |
[Encouragement Talk]
The Designing for Large Scale Traffic Collector using Flow Mediator Atsushi Kobayashi (NTT), Daisuke Matsubara (Hitachi), Tsuyoshi Kondoh, Keisuke Ishibashi (NTT) |
Recently traffic volume of Internet backbone network becomes more and more, and the diversity of networks increases, suc... [more] |
|
NS, IN (Joint) |
2007-03-08 11:10 |
Okinawa |
Okinawa Convention Center |
Effect of sampling rate and monitoring granularity on anomaly detectability Keisuke Ishibashi, Ryoichi Kawahara, Tatsuya Mori, Tsuyoshi Kondoh (NTT), Shoichiro Asano (NII) IN2006-201 |
In this paper, we quantitatively evaluate how sampling decrease detectability of anomalous traffic. We build equations ... [more] |
IN2006-201 pp.125-130 |
IA |
2007-01-19 09:05 |
Hiroshima |
International Conference Center Hiroshima |
Development of Aggregation Device for Next Generation Backbone Networks Daisuke Matsubara, Satoshi Kiyotou, Tomohiro Baba, Yasushi Fukuda (Hitachi), Atsushi Kobayashi, Tsuyoshi Kondoh (NTT) IA2006-31 |
This paper explains architecture of aggregation device that stores and aggregates traffic information of next generation... [more] |
IA2006-31 pp.5-8 |
CQ, NS, ICM (Joint) |
2006-11-16 13:10 |
Tottori |
Tottori Univ. of Environmental Studies |
[Encouragement Talk]
A Proposal of Traffic Matrix Monitoring Collector for Next Generation Backbone Atsushi Kobayashi, Tsuyoshi Kondoh, Yutaka Hirokawa, Keisuke Ishibashi, Kimihiro Yamamoto (NTT) NS2006-123 CQ2006-64 TM2006-37 |
In large-scale networks, traffic monitoring system needs to handle huge traffic flow records. So, this system's capabili... [more] |
NS2006-123 CQ2006-64 TM2006-37 pp.1-6(NS), pp.31-36(CQ), pp.1-6(TM) |
SIP, ICD, IE, IPSJ-SLDM |
2005-10-21 14:20 |
Miyagi |
Ichinobo, Sakunami-Spa |
A study for hardware optimization using a high level synthesis fron C Satoru Inoue, Tsuyoshi Kondo, Tomonori Izumi, Masahiro Fukui (Rits) |
Higher abstraction design has been highly required so that a human can focus on inspired part of design by making comput... [more] |
SIP2005-124 ICD2005-143 IE2005-88 pp.55-60 |