Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2017-08-28 14:35 |
Tokyo |
IIJ Seminar Room |
Survey of IPv6 transition technologies for security analysis Gabor Lencse, Youki Kadobayashi (NAIST) IA2017-15 |
Due to the depletion of the public IPv4 address pool, the transition to IPv6 became inevitable. However, the transition ... [more] |
IA2017-15 pp.19-24 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 09:50 |
Fukushima |
|
Proposal and evaluation of the circular migration method using a differential virtual disk Naoya Sawada, Kazuya Okada, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi (NAIST) SITE2014-72 IA2014-104 |
In recent years, "Follow The Sun" and "Follow the Moon" type data centers have been studied. To realize both of these ty... [more] |
SITE2014-72 IA2014-104 pp.137-142 |
ICSS |
2015-03-03 13:00 |
Okinawa |
Meio Univiersity |
A detection system which uses DNS traffic features to detect domains which are related to botnets Wataru Tsuda, Youki Kadobayashi, Takeshi Okuda, Hiroaki Hazeyama (NAIST) ICSS2014-63 |
[more] |
ICSS2014-63 pp.1-6 |
ICSS |
2015-03-03 16:40 |
Okinawa |
Meio Univiersity |
Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] |
ICSS2014-71 pp.49-54 |
ICSS |
2014-11-28 10:45 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
A Study of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] |
ICSS2014-60 pp.55-60 |
ICSS |
2014-11-28 11:35 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting infected hosts with machine learning analysis of DNS responses Wataru Tsuda, Youki Kadobayashi, Hirotaka Fujiwara, Suguru Yamaguchi (NAIST) ICSS2014-62 |
In recent years, we face cyber attacks such as illegal money transfer via net-banking, spam mail and DDoS attacks caused... [more] |
ICSS2014-62 pp.67-72 |
ICSS, IPSJ-SPT |
2014-03-28 10:15 |
Okinawa |
Meio Univiersity |
MATATABI: Multi-layer Threat Analysis Platform with Hadoop Hajime Tazaki (Univ. of Tokyo), Kazuya Okada (NAIST), Yuji Sekiya (Univ. of Tokyo), Youki Kadobayashi (NAIST) ICSS2013-77 |
Threat detections and analyses are indispensable processes in today’s cyberspace, but current state of the arts are stil... [more] |
ICSS2013-77 pp.113-118 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:30 |
Nara |
Todaiji Total Cultural Center |
Proposal of DDoS attack mitigation using two-step map table lookup on LISP Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-51 IA2012-89 |
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed and practiced, most ... [more] |
SITE2012-51 IA2012-89 pp.37-42 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:55 |
Nara |
Todaiji Total Cultural Center |
A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
SITE2012-52 IA2012-90 pp.43-48 |
NS, IN (Joint) |
2013-03-08 10:50 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
A Design of Sensor Data Storage System for Mobile Participatory Sensing Junya Niwa, Kazuya Okada, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi (NAIST) NS2012-214 |
The development of wireless technologies and the rapid growth of mobile devices equipped with sensors have enabled the p... [more] |
NS2012-214 pp.283-288 |
NS, IN (Joint) |
2013-03-08 09:20 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Efficiency Analysis of Location based Multicast Address Kazuya Okada, Takeshi Okuda, Youki Kadobayashi, Suguru Yamaguchi (NAIST) NS2012-242 |
Location aware information delivery is useful application, which automatically distribute information such as weather fo... [more] |
NS2012-242 pp.451-456 |
IA |
2012-11-19 17:10 |
Fukushima |
Kanponoyado Iwaki (Fukushima) |
Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
IA2012-56 pp.23-28 |
IA |
2012-11-19 18:00 |
Fukushima |
Kanponoyado Iwaki (Fukushima) |
Proposal of DDoS mitigation using decoy servers to limit attacks to a localized region Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-58 |
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed
and practiced, most... [more] |
IA2012-58 pp.35-40 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 13:05 |
Hokkaido |
|
A Study on Cybersecurity Information Discovery Mechanisms over the Internet Takeshi Takahashi, Youki Kadobayashi, Yuuki Takano (NICT) ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11 |
This paper prposes a scheme that links assorted structured cybersecurity information over networks and discovers them in... [more] |
ISEC2012-19 SITE2012-15 ICSS2012-21 EMM2012-11 pp.71-76 |
ICSS |
2011-11-18 15:30 |
Tokushima |
Naruto University of Education |
Multitenant Cloud Computing: Security Challenges and Approaches Takeshi Takahashi (NICT), Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama (NAIST), Shin'ichiro Matsuo (NICT) ICSS2011-36 |
This paper presents challenges and approaches of techniques enabling multitenancy in cloud computing, especially resourc... [more] |
ICSS2011-36 pp.25-32 |
ISEC, IT, WBS |
2011-03-04 13:50 |
Osaka |
Osaka University |
Oblivious Symmetric Key Encryption and Its Application to IP-Traceback Ryo Nojima (NICT), Youki Kadobayashi (NAIST) IT2010-99 ISEC2010-103 WBS2010-78 |
In this paper, we consider the oblivious symmetric key encryption protocol
and its application to the {\em privacy-pres... [more] |
IT2010-99 ISEC2010-103 WBS2010-78 pp.199-203 |
IA |
2010-12-17 16:15 |
Tokyo |
Room1, B3F, Kikai-Shinko-Kaikan Bldg |
A Proposal of a Virtual Router Migration Control System Using Multilayer NDL in Virtual Network Environments Tsukasa Yoneda, Kazuya Okada, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2010-68 |
Along with the developments of network virtualization technologies, techniques to migrate a virtual router from a physic... [more] |
IA2010-68 pp.61-66 |
ICSS |
2010-11-05 13:50 |
Hiroshima |
Hiroshima City University |
Ontological Approach toward Cybersecurity in Cloud Computing Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ICSS2010-49 |
Following the immense development of cloud computing, various standardization activities have been taken place.
However... [more] |
ICSS2010-49 pp.29-34 |
IPSJ-AVM, MoNA |
2010-07-15 13:00 |
Hokkaido |
Hokkaido Univ. |
Quality Index to Detect an Area with Required Communication Quality by a Wireless LAN Access Point Kazuaki Morihisa (NAIST), Yuzo Taenaka (Univ. of Tokyo), Shigeru Kashihara, Youki Kadobayashi, Suguru Yamaguchi (NAIST) MoMuC2010-18 |
Future ubiquitous wireless LANs (WLANs) provide continuous wireless connectivity by integrating cov- erage area of many ... [more] |
MoMuC2010-18 pp.1-6 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 14:15 |
Aomori |
Hirosaki University |
Building Ontology of Cybersecurity Operational Information Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ISEC2010-20 SITE2010-16 ICSS2010-26 |
Cyber threats come beyond the border of countries. However, most organizations are currently coping with them individual... [more] |
ISEC2010-20 SITE2010-16 ICSS2010-26 pp.87-91 |