Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-03-01 13:50 |
Okinawa |
Okinawa Convention Center |
Evaluation experiment on a route server function for maintaining dynamic routes in metabolic routers Yuya Suga, Hiroki Saruta, Rei Ishioka, Junichi Murayama (Tokai Univ.) IN2023-112 |
As a measure against malware infecting routers, we are studying metabolic routers. This router can delete even undetecta... [more] |
IN2023-112 pp.279-282 |
NS, IN (Joint) |
2024-03-01 14:15 |
Okinawa |
Okinawa Convention Center |
A centralized control scheme of router switching for suppressing malware spreading within a metabolic router Rei Ishioka, Yuya Suga, Junichi Murayama (Tokai Univ.) IN2023-113 |
As a countermeasure against router targeting malware, we have been studying a metabolic-type router. In this metabolic-t... [more] |
IN2023-113 pp.283-286 |
RCS, IN, NV (Joint) |
2023-05-25 10:00 |
Kanagawa |
Keio University (Hiyoshi Campus), and online (Primary: On-site, Secondary: Online) |
Designing a suppressing scheme of spreading malware infection within a metabolic router Rei Ishioka, Haruto Hirose, Junichi Murayama (Tokai Univ.) IN2023-1 |
As a countermeasure against malware infection on routers, we have been studying a metabolic-type router. Inside this rou... [more] |
IN2023-1 pp.1-4 |
CS, IN, NS, NV (Joint) |
2020-09-11 09:25 |
Online |
Online |
A virtual-network replacing scheme for achieving a metabolic network Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2020-24 |
A future targeted attacks would infect a network with a malware program and then tampers packet-forwarding routes. As a ... [more] |
IN2020-24 pp.13-18 |
CS, IN, NS, NV (Joint) |
2020-09-11 09:50 |
Online |
Online |
An edge-router replacing scheme for achieving a metabolic network Yuta Miyaoka, Yu Tamura, Junichi Murayama (Tokai Univ.) IN2020-25 |
A future cyber attack would tampers packet-forwarding routes of a target network using malware programs. As a solution a... [more] |
IN2020-25 pp.19-24 |
NS, IN (Joint) |
2020-03-05 10:40 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
A repetitive virtual router replacing scheme without service stopping Yuta Miyaoka, Yu Tamura, Junichi Murayama (Tokai Univ) IN2019-92 |
[more] |
IN2019-92 pp.97-102 |
NS, IN (Joint) |
2020-03-05 11:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
An inheritance scheme of dynamic routing information for achieving successive replacing of virtual routers Yu Tamura, Yuta Miyaoka, Junichi Murayama (Tokai Univ.) IN2019-93 |
In future targeted attacks, malware programs infected in routers may cause various problems. Thus, we have proposed a sc... [more] |
IN2019-93 pp.103-108 |
NS, IN (Joint) |
2018-03-01 09:20 |
Miyazaki |
Phoenix Seagaia Resort |
A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90 |
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] |
IN2017-90 pp.5-10 |
NS, IN (Joint) |
2018-03-01 09:40 |
Miyazaki |
Phoenix Seagaia Resort |
A Cooperation Scheme between Distributive Virtual Firewall and NAT for Countermeasuring DNS Amplification Attacks Eitetsu Gen, Junichi Murayama (Tokai Univ.) IN2017-91 |
Recently, DNS amplification attacks are occurring frequently.
This attack is one of DDoS attacks.
Thus, a large-scale ... [more] |
IN2017-91 pp.11-14 |
RCS, IN, NV (Joint) |
2017-05-12 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5 |
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] |
IN2017-5 pp.21-24 |
RCS, IN, NV (Joint) |
2017-05-12 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Lecture]
Implementing a distributive virtual firewall using OpenFlow Eitetsu Gen, Junichi Murayama (Tokai Univ.) IN2017-11 RCS2017-49 |
Recently, DNS amplification attacks to a targeted server is occurring frequently. Those attacks also cause congestion of... [more] |
IN2017-11 RCS2017-49 pp.55-58(IN), pp.109-112(RCS) |
IN, RCS (Joint) |
2016-05-20 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Virtual Firewall Scheme that Filters DNS Fragment Packets caused by DNS Amplification Attacks Eitetsu Gen (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.) IN2016-16 |
Recently, DNS amplification attacks occur frequently. Those attacks disturb service offering by means of sending many pa... [more] |
IN2016-16 pp.85-88 |
SC |
2016-03-25 10:20 |
Tokyo |
NII |
Visualization Technique to Colorize and Categorize Occurrence Frequency of Key Words in Newspapers with Temporal Scalability Ken T. Murata, Yoshiaki Nagaya, Kazunori Yamamoto (NICT), Kentaro Ukawa, Kazuya Muranaga, Junichi Murayama, Yutaka Suzuki (SEC) SC2015-22 |
We propose a technique to visualize occurrence frequency of specified categories or key words in archived database of ne... [more] |
SC2015-22 pp.1-6 |
NS, IN (Joint) |
2016-03-04 13:30 |
Miyazaki |
Phoenix Seagaia Resort |
Evaluation on Virtual Firewall Schemes against DNS Amplification Attacks Eitetsu Gen, Shota Endo (Tokai Univ.), Yuichi Sudo (NTT), Junichi Murayama (Tokai Univ.) IN2015-140 |
Recently, DDoS attacks that disturb service offering in the Internet have occurred frequently. In order to mitigate such... [more] |
IN2015-140 pp.189-192 |
NS, IN (Joint) |
2015-03-03 10:50 |
Okinawa |
Okinawa Convention Center |
Fast Log Tracing Method for Information-Leakage Prevention Koki Ikeda, Takuya Suzuki, Pichaya Kietkaroon (Tokai Univ.), Takahiro Hamada, Yuichi Murata (NTT), Junichi Murayama (Tokai Univ.) IN2014-150 |
Recently, targeted attacks for enterprise information networks occur frequently and thus secret files are leaking via ap... [more] |
IN2014-150 pp.175-178 |
MI |
2015-03-03 10:34 |
Okinawa |
Hotel Miyahira |
Development of New 4K Hi-speed Camera and Applications for Medical Engineering Ken T. Murata (NICT), Takamichi Mizuhara (Clealink), Eizen Kimura (Ehime Univ.), Yoshiaki Nagaya, Hidenobu Watanabe (NICT), Takashi Kurosawa (Hitachi Solutions), Kazuya Muranaga, Kentaro Ukawa, Junichi Murayama, Yutaka Suzuki (SEC), Osamu Tatebe, Masahiro Tanaka (Tsukuba Univ.), Kazunori Yamamoto (NICT) |
(To be available after the conference date) [more] |
|
NS, IN (Joint) |
2015-03-03 14:10 |
Okinawa |
Okinawa Convention Center |
A Flow Screening Control Scheme for Flow Networks Yusuke Watanabe, Pichaya Kietkaroon (Tokai Univ), Takahiro Hamada, Yuminobu Igarashi (NTT), Junichi Murayama (Tokai Univ) IN2014-161 |
Recently, targeted attacks for enterprise information networks occur frequently. Since a data center accommodates many e... [more] |
IN2014-161 pp.239-242 |
IN |
2012-10-12 11:25 |
Tokyo |
Tokyo Univ. Sanjo-Kaikan |
A Study of Paper AttributeAnalysis on Information Networks Masashi Toyama, Hiroto Nomura, Junichi Murayama (NTT) IN2012-102 |
When a user post a technical report, IEICE registration system requires many useful attribute information related to his... [more] |
IN2012-102 pp.151-154 |
NS, IN (Joint) |
2012-03-09 11:00 |
Miyazaki |
Miyazaki Seagia |
On Evaluation of Integrated Control of Live Migration and Traffic Engineering in Cloud Computing Hirofumi Ichihara, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2011-172 |
Virtual machine live migration, which migrate a virtual machine between data centers, is studied as a way to improve qua... [more] |
IN2011-172 pp.211-216 |
NS, IN (Joint) |
2012-03-09 11:20 |
Miyazaki |
Miyazaki Seagia |
Proposal and Evaluation of a Stable Traffic Engineering Method for Live Migration in Cloud Computing Motohiro Seki, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2011-173 |
Virtual machine live migration, which migrate a virtual machine between data centers, is studied as a way to improve qua... [more] |
IN2011-173 pp.217-222 |