高倉 弘喜 TAKAKURA HIROKI

Articles:  21-40 of 122

  • Network Behavior-Based Malware Classification Method Based on Sequence Pattern of Traffic Flow  [in Japanese]

    林 孝英 , 山口 由紀子 , 嶋田 創 , 高倉 弘喜

    コンピュータセキュリティシンポジウム2014論文集 2014(2), 394-401, 2014-10-15

    IPSJ 

  • Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation  [in Japanese]

    YANASE Shun , SHIMADA Hajime , YAMAGUCHI Yukiko , TAKAKURA Hiroki

    Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit from normal traffic and detects malicious traffic by grading deviant traffic wit …

    Technical report of IEICE. ISEC 114(115), 75-80, 2014-07-03

  • Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation  [in Japanese]

    YANASE Shun , SHIMADA Hajime , YAMAGUCHI Yukiko , TAKAKURA Hiroki

    Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit from normal traffic and detects malicious traffic by grading deviant traffic wit …

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 114(118), 75-80, 2014-07-03

  • Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation  [in Japanese]

    YANASE Shun , SHIMADA Hajime , YAMAGUCHI Yukiko , TAKAKURA Hiroki

    Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit from normal traffic and detects malicious traffic by grading deviant traffic wit …

    IEICE technical report. Information and communication system security 114(117), 75-80, 2014-07-03

  • Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation  [in Japanese]

    YANASE Shun , SHIMADA Hajime , YAMAGUCHI Yukiko , TAKAKURA Hiroki

    Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit from normal traffic and detects malicious traffic by grading deviant traffic wit …

    IEICE technical report. Social Implications of Technology and Information Ethics 114(116), 75-80, 2014-07-03

  • Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation  [in Japanese]

    Shun Yanase , Hajime Shimada , Yukiko Yamaguchi , Hiroki Takakura

    Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit from normal traffic and detects malicious traffic by grading deviant traffic wit …

    IPSJ SIG technical reports 2014-SPT-10(11), 1-6, 2014-06-26

  • Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation  [in Japanese]

    Shun Yanase , Hajime Shimada , Yukiko Yamaguchi , Hiroki Takakura

    Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit from normal traffic and detects malicious traffic by grading deviant traffic wit …

    IPSJ SIG Notes 2014-CSEC-66(11), 1-6, 2014-06-26

  • Implementation of the Administration Policy Description Method on Automatic Network Organization System  [in Japanese]

    SHIOTA Minori , YAMAGUCHI Yukiko , SHIMADA HAJIME , TAKAKURA Hiroki

    To confront recent sophisticated targeted attacks, we have to consider a information system to prevent the destruction of the system and the theft of informations even after the success of their intru …

    IEICE technical report. Information and communication system security 114(71), 49-54, 2014-06-05

  • Implementation of the Administration Policy Description Method on Automatic Network Organization System  [in Japanese]

    SHIOTA Minori , YAMAGUCHI Yukiko , SHIMADA HAJIME , TAKAKURA Hiroki

    To confront recent sophisticated targeted attacks, we have to consider a information system to prevent the destruction of the system and the theft of informations even after the success of their intru …

    IEICE technical report. Internet Architecture 114(70), 49-54, 2014-06-05

  • Proposal of malware classification method based on pattern similarity of traffic  [in Japanese]

    LIM Hyoyoung , YAMAGUCHI Yukiko , SHIMADA Hajime , TAKAKURA Hiroki

    The targeted attack, which has been burgeoning recent years, often uses its customised malicious programs. In this situation, it is difficult for security infrastructure, e. g., Intrusion Detection Sy …

    IEICE technical report. Information and communication system security 113(502), 149-154, 2014-03-27

  • Evaluations of Multi-Stage Traffic Analysis against Attacks on Websites  [in Japanese]

    YAGI Takeshi , HARIU Takeo , TAKAKURA Hiroki

    This paper proposes a method for increasing the amount of information about malware attack features in order to improve the attack detection rate. This method divides the destination URI of attacks co …

    IEICE technical report. Information and communication system security 113(288), 3-8, 2013-11-12

  • 講演抄録 情報セキュリティ : サイバー攻撃等への備え  [in Japanese]

    高倉 弘喜

    電気通信 76(802), 25-29, 2013-11

  • Development of Packet Forwarding Control for Dynamic Malware Analysis Using Pseudo Internet  [in Japanese]

    HIRONO Soshi , OHIRA Kenji , YAMAGUCHI Yukiko , YAMAKI Hirofumi , TAKAKURA Hiroki

    In dynamic malware analysis, we cannot obtain sufficient results of malware analysis without Internet connectivity. However, if an analysis system allows unrestricted communication on the Internet, it …

    IEICE technical report. Information and communication system security 113(95), 67-72, 2013-06-20

  • Threats posed by High-Performance Information Devices Designed for Home  [in Japanese]

    TAKAKURA Hiroki

    With the spread of high-speed network, like FTTH and ADSL, we can purchase high-performance network hub and broadband router at low cost. Information appliances, e.g., TV sets, also have been improved …

    IEICE technical report. Information and communication system security 113(95), 7-12, 2013-06-20

  • Development of Packet Forwarding Control for Dynamic Malware Analysis Using Pseudo Internet  [in Japanese]

    HIRONO Soshi , OHIRA Kenji , YAMAGUCHI Yukiko , YAMAKI Hirofumi , TAKAKURA Hiroki

    In dynamic malware analysis, we cannot obtain sufficient results of malware analysis without Internet connectivity. However, if an analysis system allows unrestricted communication on the Internet, it …

    IEICE technical report. Internet Architecture 113(94), 67-72, 2013-06-20

  • Threats posed by High-Performance Information Devices Designed for Home  [in Japanese]

    TAKAKURA Hiroki

    With the spread of high-speed network, like FTTH and ADSL, we can purchase high-performance network hub and broadband router at low cost. Information appliances, e.g., TV sets, also have been improved …

    IEICE technical report. Internet Architecture 113(94), 7-12, 2013-06-20

  • Design of a Prototype System to Acquire IPv6 Node Information for Incident Handling  [in Japanese]

    OHIRA Kenji , YAMAGUCHI Yukiko , YAMAKI Hirofumi , TAKAKURA Hiroki , HOSHINO Hiroshi , NAKANO Hiroki

    IPv4アドレスのIANAプール枯渇(2011年2月3日)などを受け,エンタープライズネットワークへのIPv6の展開が急がれている.一方で,一般論として,IPv6をエンタープライズネットワークに導入する際には,(a)IPv6アドレスから当該アドレスを使用した端末の追跡が困難であること,(b)管理者の管理下にないネットワークを容易にエンタープライズネットワークに無断接続できること,(c)IPv6アド …

    The IEICE transactions on information and systems (Japanese edetion) 96(6), 1483-1492, 2013-06-01

    References (20)

  • Combating for DoS Attacks : 2.1 Observation Diary of DoS/DDoS Attacks (1) - Your Users Might Be Involved in DDoS Attacks -  [in Japanese]

    高倉 弘喜

    本解説では,外部からの大量パケット送信やサーバヘのhalf connection攻撃のような一般的なDoS/DDoS攻撃ではなく,組織内の機器を悪用され,内部からDDoS攻撃を仕掛けられた事例を挙げ,攻撃の検知,解析,対策の難しさについて説明する.

    情報処理 54(5), 436-444, 2013-04-15

    IPSJ  IPSJ 

  • ネットワーク内部分離設計のための自動評価機能および自動設定機能の実装  [in Japanese]

    長谷川皓一 , 山口由紀子 , 八槇博史 , 立岩佑一郎 , 新麗 , 加藤雅彦 , 高倉弘喜

    近年の巧妙化するサイバー攻撃に対して、不正アクセス検知システムなどを用いた従来の対策に加え、出口対策が注目されている。しかし、速やかな不正通信の検知と、情報資産を保護するためには、組織内ネットワークをその特性に応じて分離し、適切なアクセス制御を行う必要がある。我々は、このようなネットワークの内部分離設計の自動構成、シミュレーションによる可視化・評価、およびネットワーク装置への自動設定を行う支援シス …

    第75回全国大会講演論文集 2013(1), 545-546, 2013-03-06

    IPSJ 

Page Top