Paper Abstract and Keywords |
Presentation |
2015-11-06 16:20
A Feasibility Study of Autonomous Security Infrastructure in the Internet Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security achieved by traditional approaches that rely on the defense of individual systems. A different approach such as autonomous security infrastructure functioning as adaptive firewalls that prevent malicious packets from flowing into and from the Internet, is required. Various experiments were performed on the test-bed incorporating OpenFlow-based prototypes of multi-layer binding (MLB) router, which is the core technology. As a result, there is no fatal barrier in realizing, it is also discussed that the proposed infrastructure can function persistently along with the progress of authentication, soundness and intrusion detection technologies from a technical point of view. Furthermore, it is discussed that, because of malware polluted IoTs being able to be detoxified by the MLB router alone, security needs in critical facilities such as social infrastructure become innovators, and cooperation among Japan, the US and the EU is necessary to get over the chasm to spread it in the Internet from the view of social science. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
countermeasure against cyber-attacks / autonomous security infrastructure / adaptive firewall, / multi-layer binding router / MLBR / IoT / OpenFlow / dropping request protocol |
Reference Info. |
IEICE Tech. Rep., vol. 115, no. 293, ISEC2015-46, pp. 67-74, Nov. 2015. |
Paper # |
ISEC2015-46 |
Date of Issue |
2015-10-30 (ISEC, SITE, LOIS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
ISEC2015-46 SITE2015-33 LOIS2015-40 |
Conference Information |
Committee |
LOIS ISEC SITE |
Conference Date |
2015-11-06 - 2015-11-07 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Kanagawa Univ. |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
|
Paper Information |
Registration To |
ISEC |
Conference Code |
2015-11-LOIS-ISEC-SITE |
Language |
Japanese |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
A Feasibility Study of Autonomous Security Infrastructure in the Internet |
Sub Title (in English) |
|
Keyword(1) |
countermeasure against cyber-attacks |
Keyword(2) |
autonomous security infrastructure |
Keyword(3) |
adaptive firewall, |
Keyword(4) |
multi-layer binding router |
Keyword(5) |
MLBR |
Keyword(6) |
IoT |
Keyword(7) |
OpenFlow |
Keyword(8) |
dropping request protocol |
1st Author's Name |
Hiroshi KobayashiI |
1st Author's Affiliation |
Tokyo Denki University (TDU) |
2nd Author's Name |
Hirofumi Yamaki |
2nd Author's Affiliation |
Tokyo Denki University (TDU) |
3rd Author's Name |
Yoichiro Ueno |
3rd Author's Affiliation |
Tokyo Denki University (TDU) |
4th Author's Name |
Kaoru Sano |
4th Author's Affiliation |
Tokyo Denki University (TDU) |
5th Author's Name |
Ryoichi Sasaki |
5th Author's Affiliation |
Tokyo Denki University (TDU) |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-1 |
Date Time |
2015-11-06 16:20:00 |
Presentation Time |
25 minutes |
Registration for |
ISEC |
Paper # |
ISEC2015-46, SITE2015-33, LOIS2015-40 |
Volume (vol) |
vol.115 |
Number (no) |
no.293(ISEC), no.294(SITE), no.295(LOIS) |
Page |
pp.67-74 |
#Pages |
8 |
Date of Issue |
2015-10-30 (ISEC, SITE, LOIS) |
|