Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, NS (Joint) |
2008-07-18 09:20 |
Kyoto |
Kyoto University |
Evaluation of Intra-Access-Network Traffic Engineering for Peer-to-Peer Applications Satoshi Kamei, Ryoichi Kawahara, Haruhisa Hasegawa, Hideaki Yoshino, Kou Miyake (NTT) NS2008-33 |
[more] |
NS2008-33 pp.43-48 |
NS |
2008-05-15 15:00 |
Hokkaido |
Future University-Hakodate |
Evaluation for Detectability of Identifying the Anomalous Traffic Using Delta Traffic Shigeaki Harada, Ryoichi Kawahara, Noriaki Kamiyama, Tsuyoshi Kondoh, Keisuke Ishibashi (NTT), Shoichiro Asano (NII) NS2008-1 |
To mitigate the anomalous traffic such as DDoS attacks,
it is necessary to accurately identify the anomalous traffic so... [more] |
NS2008-1 pp.1-6 |
NS |
2008-05-15 16:15 |
Hokkaido |
Future University-Hakodate |
Analysis of Efficient Network Structure for Parallel Download Noriaki Kamiyama, Ryoichi Kawahara, Haruhisa Hasegawa (NTT) NS2008-4 |
In the Internet, video streaming service in which users can enjoy videos at home is becoming popular. Video streaming wi... [more] |
NS2008-4 pp.19-24 |
IN |
2008-02-15 13:55 |
Kagawa |
Kagawa University |
A proposal of file sharing method in P2P network considering the backlog of file transfer time Tomohiro Onuma (Univ.), Ryoichi Kawahara (NTT), Masatoshi Kawarasaki (Univ.) IN2007-156 |
Content acquisition in P2P network generally takes long time to complete file-downloading. This paper proposes an improv... [more] |
IN2007-156 pp.81-86 |
NS, ICM, CQ (Joint) |
2007-11-15 16:50 |
Fukuoka |
Institute of System LSI Design Industry, Fukuoka |
Impact of unreliable link metric on traffic routing performance Mizuho Kodama (Osaka Univ.), Satoshi Kamei (NTT), Go Hasegawa (Osaka Univ.), Ryoichi Kawahara (NTT), Masayuki Murata (Osaka Univ.), Hideaki Yoshino (NTT) CQ2007-76 |
In this report, we focus on network control mechanisms, especially traffic routing mechanisms, for achieving globaloptim... [more] |
CQ2007-76 pp.25-30 |
NS, CS, IN (Joint) |
2007-09-20 10:40 |
Miyagi |
Tohoku University |
Performance analysis of QoS overlay routing and its adaptation to various QoS metrics Ryoichi Kawahara, Eng Keong Lua (NTT), Masato Uchida (Kyushu Inst. of Tech.), Satoshi Kamei, Hideaki Yoshino (NTT) IN2007-44 |
[more] |
IN2007-44 pp.7-12 |
NS, CS, IN (Joint) |
2007-09-21 09:30 |
Miyagi |
Tohoku University |
A method of detecting network anomalies for periodic traffic Shigeaki Harada, Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Hideaki Yoshino (NTT) IN2007-59 |
We present a method of detecting network anomalies, such as DDoS attacks and flash crowds, automatically in real time.
... [more] |
IN2007-59 pp.93-98 |
IN |
2007-07-19 15:35 |
Hyogo |
Kobe University |
Optimum Parameter Setting in Identifying and Quarantining Worm-Infected Hosts Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada (NTT) IN2007-29 |
Abusive traffic caused by worm is a serious problem in the Internet because it consumes a large portion of network resou... [more] |
IN2007-29 pp.13-18 |
IN |
2007-06-22 14:35 |
Hokkaido |
Future University-Hakodate |
Identifying Worm-Infected Hosts Using White List Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino (NTT) IN2007-24 |
In the Internet, a rapid spread of worm is a serious problem. In many cases, worm-infected hosts generate huge amount of... [more] |
IN2007-24 pp.79-84 |
NS, IN (Joint) |
2007-03-08 11:10 |
Okinawa |
Okinawa Convention Center |
Effect of sampling rate and monitoring granularity on anomaly detectability Keisuke Ishibashi, Ryoichi Kawahara, Tatsuya Mori, Tsuyoshi Kondoh (NTT), Shoichiro Asano (NII) IN2006-201 |
In this paper, we quantitatively evaluate how sampling decrease detectability of anomalous traffic. We build equations ... [more] |
IN2006-201 pp.125-130 |
NS, IN (Joint) |
2007-03-08 11:30 |
Okinawa |
Okinawa Convention Center |
Detection accuracy of network anomaly detection using sampled flow statistics Ryoichi Kawahara, Keisuke Ishibashi, Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada (NTT), Shoichiro Asano (NII) IN2006-202 |
We showed so far that network anomalies generating a huge number of
small flows, such as network scans or SYN flooding... [more] |
IN2006-202 pp.131-136 |
NS, IN (Joint) |
2007-03-09 16:20 |
Okinawa |
Okinawa Convention Center |
How do Internet routing policies give rise to triangle inequality violations in latency measurements? Eng Keong Lua, Ryoichi Kawahara, Satoshi Kamei (NTT) IN2006-267 |
Round-Trip-Times (RTTs) play an important role in Internet latency
measurements. In this paper, we explore the ways in ... [more] |
IN2006-267 pp.519-524 |
NS, IN (Joint) |
2007-03-09 13:10 |
Okinawa |
Okinawa Convention Center |
Traffic Leap Detection for Internet Backbone Yutaka Hirokawa, Kimihiro Yamamoto, Shigeaki Harada, Ryoichi Kawahara (NTT) NS2006-235 |
This paper focus on the Internet Backbone traffic and proposes a method for detecting the Traffic Leaps which are rapid ... [more] |
NS2006-235 pp.403-408 |
IN |
2006-12-15 14:50 |
Osaka |
|
A method of detecting network anomalies and determining their termination. Shigeaki Harada, Ryoichi Kawahara, Tatsuya Mori, Noriaki Kamiyama, Yutaka Hirokawa, Kimihiro Yamamoto (NTT) IN2006-133 |
Detecting network anomalies such as DDoS attack has become more and more crucial in these days. When we monitor large-sc... [more] |
IN2006-133 pp.115-120 |
CQ, NS, ICM (Joint) |
2006-11-16 13:30 |
Tottori |
Tottori Univ. of Environmental Studies |
A study on detecting network anomalies using sampled flow statistics Ryoichi Kawahara, Tatsuya Mori, Keisuke Ishibashi, Noriaki Kamiyama, Shigeaki Harada (NTT), Shoichiro Asano (NII) NS2006-124 CQ2006-65 TM2006-38 |
[more] |
NS2006-124 CQ2006-65 TM2006-38 pp.7-12(NS), pp.37-42(CQ), pp.7-12(TM) |
CQ, NS, ICM (Joint) |
2006-11-16 13:50 |
Tottori |
Tottori Univ. of Environmental Studies |
Inferring original traffic pattern from sampled flow statistics Tatsuya Mori, Ryoichi Kawahara, Noriaki Kamiyama, Keisuke Ishibashi, Shigeaki Harada (NTT) NS2006-125 CQ2006-66 TM2006-39 |
[more] |
NS2006-125 CQ2006-66 TM2006-39 pp.13-18(NS), pp.43-48(CQ), pp.13-18(TM) |
IN, NS, CS (Joint) |
2006-09-14 11:40 |
Miyagi |
|
Evaluation of QoS overlay routing algorithm to cope with changes in traffic patterns Ryoichi Kawahara (NTT), Masato Uchida (Kyushu Inst. of Tech.), Satoshi Kamei (NTT) IN2006-55 |
A recent trend in routing research is the use of overlay routing to improve end-to-end QoS without changing the network ... [more] |
IN2006-55 pp.37-42 |
IN, NS, CS (Joint) |
2006-09-15 10:50 |
Miyagi |
|
Performance Evaluation of Flow Hog Identification Method Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara (NTT) IN2006-66 |
Worm-infected hosts generate a large number of flows during a short time. We proposed a method identifying hosts that ge... [more] |
IN2006-66 pp.97-102 |
IN, NS, CS (Joint) |
2006-09-15 15:00 |
Miyagi |
|
[Encouragement Talk]
NetDelta: Method for detailed, long-term analysis of massive amount of traffic data Tatsuya Mori, Keisuke Ishibashi, Noriaki Kamiyama, Ryoichi Kawahara (NTT), Shoichiro Asano (NII) NS2006-94 |
This paper presents a novel network measurement method ---
NetDelta --- to establish DEtailed, Long-Term Analysis of a... [more] |
NS2006-94 pp.133-138 |
IN, NS, CS (Joint) |
2006-09-15 15:20 |
Miyagi |
|
[Encouragement Talk]
The Effect of Physical and Logical Network Topologies on File Transfer Time for Overlay Networks Yasuo Tamura, Shoji Kasahara, Yutaka Takahashi (Kyoto Univ.), Satoshi Kamei, Ryoichi Kawahara (NTT) NS2006-95 |
In overlay networks including peer-to-peer networks, data files are transferred by overlay routing managed at applicatio... [more] |
NS2006-95 pp.139-144 |