Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2022-10-14 16:45 |
Tokyo |
Koshiba Hall, The University of Tokyo (Tokyo, Online) (Primary: On-site, Secondary: Online) |
A Deployment of SRv6 Single Stack Backbone at ShowNet 2022 Ryo Nakamura (Univ of Tokyo), Teppei Kamata (Cisco), Kazuki Shimizu (Juniper), Masato Hirose (NTTcom), Takayuki Watanabe (Juniper), Takashi Tomine (NICT) IA2022-33 |
This paper reports the design and deployment of the SRv6 single-stack backbone at Interop Tokyo 2022 ShowNet. Interop To... [more] |
IA2022-33 pp.1-6 |
IA |
2019-10-04 17:15 |
Tokyo |
Tokyo Univ., Hongo Campus, Takeda Hall (Tokyo) |
A trial of SRv6 Service Chaining at ShowNet 2019 Ryo Nakamura (Univ of Tokyo), Yukito Ueno (NTTcom), Teppei Kamata (Cisco), Kazuki Shimizu (Juniper), Takashi Tomine (Lepidum), Takayuki Watanabe (Juniper) IA2019-23 |
This paper reports a trial of Segment Routing IPv6 (SRv6)-based service chaining at ShowNet in Interop Tokyo 2019. Inter... [more] |
IA2019-23 pp.23-28 |
ICSS, IPSJ-SPT |
2019-03-08 14:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center (Okinawa) |
A Trouble Ticket System Specialized for Incident Response Yu Tsuda, Takashi Tomine (NICT), Masato Jingu (NICT/HISYS), Keisuke Iwasaki (NTT-AT), Kenjiro Terada, Daisuke Inoue (NICT) ICSS2018-92 |
In case that an organization has damaged by a cyberattack, it is crucial to minimize the damage by rapid security incide... [more] |
ICSS2018-92 pp.197-202 |
IA, IN (Joint) |
2018-12-13 16:10 |
Hiroshima |
Hiroshima Univ. (Hiroshima) |
[Invited Talk]
Inter-regional Service Chaining based on IP routing techniques in ShowNet 2018 Yukito Ueno (NTT Com), Ryo Nakamura (The University of Tokyo), Teppei Kamata (Cisco Systems G.K.), Kazuki Shimizu (Juniper Networks), Takashi Tomine (Lepidum), Takayuki Watanabe (Juniper Networks) |
[more] |
|
ICSS |
2018-11-21 16:05 |
Kagoshima |
(Kagoshima) |
[Invited Talk]
Security Countermeasure at ShowNet in Interop Tokyo 2018 Kenichiro Hashimoto (Lastline), Masato Jingu (NICT), Takashi Tomine (lepidum) ICSS2018-59 |
Cyber attacks become emerging threats on the Internet.We held an exhibition in ICT called Interop Tokyo every June. In t... [more] |
ICSS2018-59 p.37 |
IA |
2018-09-04 16:05 |
Hokkaido |
Hokkaido Univ. Conference Hall (Hokkaido) |
Service Chaining based on IP Routing Techniques in ShowNet 2018 Ryo Nakamura (Univ of Tokyo), Yukito Ueno (NTTcom), Teppei Kamata (Cisco), Kazuki Shiimizu (Juniper), Takashi Tomine (NICT), Takayuki Watanabe (Juniper) IA2018-30 |
This paper reports a practical service function chaining operated at
ShowNet in Interop Tokyo 2018. Interop Tokyo is ... [more] |
IA2018-30 pp.91-96 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-04 11:35 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) (Saga) |
A Proposal of Timeline-Based Event Log Management Method Takashi Tomine, Yu Tsuda (NICT), Akira Kato, Hideki Sunahara (Keio Univ.), Daisuke Inoue (NICT) SITE2015-74 IA2015-106 |
When a network trouble is happen, network operators are surveying information such as logs and statistics, from close ne... [more] |
SITE2015-74 IA2015-106 pp.227-232 |
ICSS |
2015-03-03 15:15 |
Okinawa |
Meio Univiersity (Okinawa) |
A Pluggable and Programmable Flamework for Analyzing Security Logs Yu Tsuda, Takashi Tomine, Masaki Kamizono, Masashi Eto, Daisuke Inoue (NICT) ICSS2014-68 |
SIEM (Security Information and Event Management) systems can unify a lot of security logs from various security applianc... [more] |
ICSS2014-68 pp.31-36 |
ICSS |
2015-03-04 10:50 |
Okinawa |
Meio Univiersity (Okinawa) |
Prediction of Malware Activities based on Loopback Address from DNS Masaki Kamizono (NICT/SecureBrain), Takashi Tomine, Yu Tsuda, Masashi Eto (NICT), Yuji Hoshizawa (Securebrain Corporation), Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (ynu) ICSS2014-80 |
During malware dynamic analysis, the analysis system often finds the loopback address in responses of DNS name resolutio... [more] |
ICSS2014-80 pp.103-108 |
IA |
2014-10-07 16:55 |
Osaka |
Grand Front OSAKA Tower-B 10F (Osaka) |
Recent cyber attack methodology and protection
-- The Consideration based on Interop Tokyo 2014 ShowNet Security -- Ken Hashimoto (FireEye), Takashi Tomine (NICT), Yuji Sekiya (Univ. of Tokyo) IA2014-33 |
In social activities and daily life, a share of activities from the Internet has been gotten higher. Due to that changes... [more] |
IA2014-33 pp.51-56 |
ICSS, IPSJ-SPT |
2014-03-28 11:15 |
Okinawa |
Meio Univiersity (Okinawa) |
Timeline-Based Event Log Viewer over Multi-Host Environment Takashi Tomine, Yu Tsuda, Masaki Kamizono (NICT), Kazunori Sugiura (Keio Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2013-79 |
A cyber attacking becomes clever and complicated.
Recently the number of Advanced Persistent Threat (APT) attacks to ge... [more] |
ICSS2013-79 pp.125-130 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 09:20 |
Hokkaido |
Hokkaido Univ. (Hokkaido) |
Design and Implementation of Network Covert Channel Validation Framework Takashi Tomine (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) SITE2011-47 IA2011-97 |
Network covert channels are communication channels or information transfer methods in networks which are not intended fo... [more] |
SITE2011-47 IA2011-97 pp.185-190 |
IA, SITE, IPSJ-IOT [detail] |
2010-03-01 17:10 |
Miyagi |
(Miyagi) |
A Study of Privacy Friendly Abstraction Processing Method for Packet Capturing Atsushi Nishio, Takashi Tomine, Kazunori Sugiura (Keio Univ.) SITE2009-48 IA2009-100 |
In this research, we discuss about privacy friendly abstraction processing method for traffic data, which acquired by pa... [more] |
SITE2009-48 IA2009-100 pp.55-59 |
NS, PN (Joint) |
2005-12-15 09:25 |
Ehime |
(Ehime) |
Implementation of collaborated remoteness performance environment by the Internet Metronome Takashi Tomine, Tsuyoshi Hisamatsu, Kazunori Sugiura, Osamu Nakamura, Jun Murai (Keio Univ.) |
[more] |
NS2005-134 pp.5-8 |