Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2015-03-03 13:00 |
Okinawa |
Meio Univiersity |
A detection system which uses DNS traffic features to detect domains which are related to botnets Wataru Tsuda, Youki Kadobayashi, Takeshi Okuda, Hiroaki Hazeyama (NAIST) ICSS2014-63 |
[more] |
ICSS2014-63 pp.1-6 |
ICSS |
2015-03-03 14:50 |
Okinawa |
Meio Univiersity |
A trial of network security tests over federated testbeds Masatoshi Enomoto, Hiroaki Hazeyama (NAIST), Kazumasa Kobayashi (KUSA), Suguru Yamaguchi (NAIST) ICSS2014-67 |
In network security test environment constructed in wide area, we can test independent of site or scale of test suite or... [more] |
ICSS2014-67 pp.25-29 |
ICSS |
2015-03-03 16:40 |
Okinawa |
Meio Univiersity |
Implementation and evaluation of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama (NAIST), Takuji Iimura (UT), Youki Kadobayashi (NAIST) ICSS2014-71 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in a browser or in browse... [more] |
ICSS2014-71 pp.49-54 |
ICSS |
2014-11-28 10:45 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
A Study of Drive by Download Attack detection using the features of the obfuscation Hirotaka Fujiwara (NAIST), Gregory Blanc (TSP), Hiroaki Hazeyama, Youki Kadobayashi (NAIST) ICSS2014-60 |
Drive-by download attacks usually redirect a user to a malicious webpage where vulnerabilities in the browser or its plu... [more] |
ICSS2014-60 pp.55-60 |
IA |
2014-10-07 16:30 |
Osaka |
Grand Front OSAKA Tower-B 10F |
The current state and the future direction of the data center facility
-- The experience from the construction of "ShowNet" at Interop Tokyo 2014 -- Koichi Ito (Japan Telegaertner), Yuji Sekiya (Univ. of Tokyo), Satoshi Uda (JAIST), Hiroaki Hazeyama (NAIST) IA2014-32 |
The importance of data center as inter-exchange point of Cloud and Big-data is growing up. And the equipment for Cloud a... [more] |
IA2014-32 pp.47-49 |
IA |
2013-09-06 13:30 |
Tokyo |
IIJ |
Current status of IPv4/IPv6 co-existent technologies and interoperability test in ShowNet Shuichi Ohkubo (SAKURA Internet), Hiroaki Hazeyama (NAIST), Kiriro Mano (A10 Networks), Shigeru Watanabe IA2013-21 |
Applicability of IPv4/IPv6 co-existent technologies and report the result of interoperability test in Interop2013 ShowNe... [more] |
IA2013-21 pp.25-28 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:30 |
Nara |
Todaiji Total Cultural Center |
Proposal of DDoS attack mitigation using two-step map table lookup on LISP Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-51 IA2012-89 |
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed and practiced, most ... [more] |
SITE2012-51 IA2012-89 pp.37-42 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 11:55 |
Nara |
Todaiji Total Cultural Center |
A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
SITE2012-52 IA2012-90 pp.43-48 |
IA |
2013-02-15 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Toward flexible network tester with FPGA Yohei Kuga, Takeshi Matsuya (Keio Univ.), Hiroaki Hazeyama (NAIST), Osamu Nakamura (Keio Univ.) IA2012-85 |
To measure performances of network hardware, there are methods of using the software and specialized hardware.
Software... [more] |
IA2012-85 pp.89-94 |
IA |
2013-02-15 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Formal approach for verification of routing protocols Tomoki Murota (Univ. of Tokyo), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) IA2012-86 |
[more] |
IA2012-86 pp.95-100 |
IA |
2012-11-19 17:10 |
Fukushima |
Kanponoyado Iwaki (Fukushima) |
Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56 |
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] |
IA2012-56 pp.23-28 |
IA |
2012-11-19 18:00 |
Fukushima |
Kanponoyado Iwaki (Fukushima) |
Proposal of DDoS mitigation using decoy servers to limit attacks to a localized region Toshifumi Saito, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-58 |
DDoS attacks are serious threats. Although many countermeasures to DDoS attacks have been developed
and practiced, most... [more] |
IA2012-58 pp.35-40 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 09:20 |
Hokkaido |
Hokkaido Univ. |
Design and Implementation of Network Covert Channel Validation Framework Takashi Tomine (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) SITE2011-47 IA2011-97 |
Network covert channels are communication channels or information transfer methods in networks which are not intended fo... [more] |
SITE2011-47 IA2011-97 pp.185-190 |
ICSS |
2011-11-18 15:30 |
Tokushima |
Naruto University of Education |
Multitenant Cloud Computing: Security Challenges and Approaches Takeshi Takahashi (NICT), Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama (NAIST), Shin'ichiro Matsuo (NICT) ICSS2011-36 |
This paper presents challenges and approaches of techniques enabling multitenancy in cloud computing, especially resourc... [more] |
ICSS2011-36 pp.25-32 |
ICSS |
2011-03-25 13:25 |
Tokyo |
Suspended |
Consideration on hidden-communication channel in the Internet communication device. Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) ICSS2010-60 |
Since the Internet became the society infrastructure, it is necessary to verify the vulnerability of network equip-
men... [more] |
ICSS2010-60 pp.23-28 |
IA |
2010-12-17 16:15 |
Tokyo |
Room1, B3F, Kikai-Shinko-Kaikan Bldg |
A Proposal of a Virtual Router Migration Control System Using Multilayer NDL in Virtual Network Environments Tsukasa Yoneda, Kazuya Okada, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2010-68 |
Along with the developments of network virtualization technologies, techniques to migrate a virtual router from a physic... [more] |
IA2010-68 pp.61-66 |
IA |
2010-08-06 15:45 |
Tokyo |
IIJ Kanda Jinbocho Bldg. |
An implemetation of a rapid graph drawing toolset for large scale network topologies Hiroaki Hazeyama (NAIST), Hiroyuki Fujiwara (SCW) IA2010-26 |
Generally, it is difficult to draw a graph of large scale network such as the Internet according to the change of the ne... [more] |
IA2010-26 pp.55-60 |
IA, SITE, IPSJ-IOT [detail] |
2010-03-01 15:50 |
Miyagi |
|
A consideration of resource allocation problems on network emulation testbed with virtual machine Masatoshi Enomoto, Hiroaki Hazeyama (NAIST), Shinsuke Miwa (NICT), Youki Kadobayashi (NAIST) SITE2009-47 IA2009-99 |
[more] |
SITE2009-47 IA2009-99 pp.43-48 |
IA, SITE, IPSJ-IOT [detail] |
2010-03-02 13:45 |
Miyagi |
|
Stability Verification of Miniture Internet Using Live Traffic Satoshi Ohta, Toshiyuki Miyachi, Shinsuke Miwa (NICT), Hiroaki Hazeyama, Masatoshi Enomoto (NAIST), Yoichi Shinoda (JAIST) SITE2009-66 IA2009-118 |
We have been developing a method to construct a realistic environment
that simulates the Internet on a testbed.
To ... [more] |
SITE2009-66 IA2009-118 pp.259-264 |
IA |
2009-09-25 14:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Design of Resource Allocation Meta-System for JGN2plu IaaS Hiroaki Hazeyama (NAIST/NICT), Yoshihiko Kanaumi (Univ. of Tokyo/NICT), Takashi Miyake (NICT), Seiichi Yamamoto (Univ. of Tokyo/NICT), Katsuyuki Hasebe (NTT/NICT), Eiji Kawai (NICT), Kazumasa Kobayashi (Kurashiki Univ. of Sci and The Arts/NICT) IA2009-38 |
JGN2plus Project of NICT Advanced Testbed Network for R\&D group plans to start operating ``Infrastructure as a Service... [more] |
IA2009-38 pp.29-36 |