Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2013-10-10 14:00 |
Overseas |
Konkuk Univ., Seoul |
Proposal of a Network Control System to Detect, Analyze and Mitigate Targeted Cyber Attacks Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2013-26 |
Recently, targeted cyber attacks have been so sophisticated that we cannot detect them at early stage of intrusion.
The... [more] |
IA2013-26 pp.1-6 |
IA, ICSS |
2013-06-20 13:45 |
Niigata |
Ao-re Nagaoka |
[Invited Talk]
Threats posed by High-Perfomance Information Devices Designed for Home Hiroki Takakura (Nagoya Univ.) IA2013-2 ICSS2013-2 |
[more] |
IA2013-2 ICSS2013-2 pp.7-12 |
IA, ICSS |
2013-06-21 13:00 |
Niigata |
Ao-re Nagaoka |
Development of Packet Forwarding Control for Dynamic Malware Analysis Using Pseudo Internet Soshi Hirono (Nagoya Univ.), Kenji Ohira (NAIST), Yukiko Yamaguchi (Nagoya Univ.), Hirofumi Yamaki (Tokyo Denki Univ.), Hiroki Takakura (Nagoya Univ.) IA2013-12 ICSS2013-12 |
In dynamic malware analysis, we cannot obtain sufficient results of malware analysis without Internet connectivity. How... [more] |
IA2013-12 ICSS2013-12 pp.67-72 |
ICSS |
2012-11-22 14:30 |
Hiroshima |
Miyajima Mori-no-Yado |
Proposal of a network design support system for risk mitigation against inside attacks Hirokazu Hasegawa (Nagoya Univ.), Ray Atarashi (IIJ-II), Masahiko Kato (IIJ), Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura (Nagoya Univ.) ICSS2012-51 |
In sophisticated cyber attacks, even information protected by an isolated network is compromised. Although there are var... [more] |
ICSS2012-51 pp.37-42 |
IA |
2012-10-18 16:30 |
Overseas |
Phuket |
A lightweight method to discriminate spamming hosts by periodically changing DNS response Naoya Kitagawa, Hiroki Takakura (Nagoya Univ.), Tsunehiko Suzuki (Chukyo Univ.) IA2012-39 |
With widespread of IPv6 usage, current anti-spam techniques which depend on reputations of IP address are losing their a... [more] |
IA2012-39 pp.31-35 |
IA |
2012-10-19 16:30 |
Overseas |
Phuket |
Transparent Server Migration between Datacenters by Utilizing OpenFlow Tatsuya Fukushima, Hirofumi Yamaki, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) IA2012-50 |
For disaster mitigation, mechanisms that restore network service swiftly have drawn attention.
For the swiftness, host... [more] |
IA2012-50 pp.95-100 |
IA |
2011-11-29 09:25 |
Hokkaido |
Greenpia Onuma (Hakodate) |
Development of Authentication Infrastructure for Tokai Academic Cloud Using Shibboleth and CAS Shoji Kajita (Kyoto Univ.), Shoichi Saito (Nagoya Inst. of Tech.), Masatoshi Tsuchiya (Toyohashi Univ. of Tech.), Daisuke Yamamoto (Nagoya Inst. of Tech.), Tsunehiko Suzuki (Chukyo Univ.), Yukiko Yamaguchi (Nagoya Univ.), Takahiro Hasegawa (Shizuoka Univ.), Akiumi Hasegawa (Chukyo Univ.), Akiji Tanaka, Yuichi Uchida (Gifu Univ.), Ichiro Mitsuhashi, Yoshimasa Ohta (Mie Univ.), Hiroki Takakura (Nagoya Univ.), Hiroshi Matsuo (Nagoya Inst. of Tech.) IA2011-44 |
This paper describes the current status of Authentication Infrastructure for Tokai Academic Cloud. Currently we have bee... [more] |
IA2011-44 pp.49-53 |
IA |
2011-10-21 14:00 |
Overseas |
Dalian University of Technology (Dalian, China) |
Current Status of Nagoya University Survivor Confirmation System and Lessons Learned from Great East Japan Earthquake Shoji Kajita, Yoshihiro Ohta, Kenji Ohira, Hisanori Tajima, Satoshi Ishiguro, Jun Tobita, Hiroki Takakura, Yoshito Itoh (Nagoya Univ.) IA2011-33 |
Nagoya University has been stepwisely developing a home-grown survivor confirmation system on top of Nagoya University P... [more] |
IA2011-33 pp.45-50 |
IA |
2010-11-24 17:45 |
Yamanashi |
Seisen-Ryo |
Construction of high performance network intrusion system Moriteru Ishida (Kyoto Univ.), Hiroki Takakura (Nagoya Univ.), Yasuo Okabe (Kyoto Univ.) IA2010-56 |
Intrusion detection systems(IDSs) are equipments important to network security. Recently, there’s been an increase in re... [more] |
IA2010-56 pp.31-36 |
IA |
2009-11-25 16:00 |
Saga |
Saga-Ken |
An analysis of IDS alerts to grasp attack situation in the third party's network Kensuke Nakata, Hiroki Takakura, Yasuo Okabe (Kyoto Univ) IA2009-62 |
To fight against emerging cyber attacks on Internet,
various types of security solutions have been proposed.
As one ... [more] |
IA2009-62 pp.25-30 |
ICSS |
2009-05-15 15:10 |
Hyogo |
Kobe University |
Investigation of Spam Mail Driven Web-Based Passive Attack Yuhei Kawakoya, Mitsuaki Akiyama, Kazufumi Aoki, Mitsutaka Itoh (NTT), Hiroki Takakura (Kyoto Univ) ICSS2009-5 |
In recent years, the number of web-based passive attacks which are driven by URLs included in spam mail is increasing. B... [more] |
ICSS2009-5 pp.21-26 |
IA |
2007-01-19 11:25 |
Hiroshima |
International Conference Center Hiroshima |
Analysis and Visualization of Network IDS Data Using Machine Learning Hayato Ohba, JungSuk Song, Hiroki Takakura, Yasuo Okabe (Kyoto Univ.) IA2006-36 |
In this paper, we clarify the differences between both datasets by using the log data of an IDS deployed in Kyoto Univer... [more] |
IA2006-36 pp.31-36 |
IA |
2006-05-24 10:50 |
Kyoto |
Campus Plaza Kyoto |
A Construction Method of a Honeypot System to Safely Collect Unknown Malicious Codes Kenji Ohira, JungSuk Song, Hiroki Takakura, Yasuo Okabe (Kyoto Univ.) IA2006-1 |
It is considered that an attacker tests his attacking codes by sending them to randomly selected nodes in the Internet.
... [more] |
IA2006-1 pp.1-6 |
IA |
2006-01-20 11:30 |
Miyagi |
Sendai International Center |
Analyzing traffic directed to unused IP address blocks Kazuya Suzuki, Shunsuke Baba (Yokogawa Electric Corp.), Hiroki Takakura (Kyoto Univ.) |
In network security, it is very important to detect a security incident such as scanning activity, which often is a prec... [more] |
IA2005-23 pp.25-30 |